Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.
Johannes B. Ullrich, CTO of the Sans Institute, told Ars he has been able to confirm that the malicious worm has infected around 1,000 Linksys E1000, E1200, and E2400 routers, although the actual number of hijacked devices worldwide could be much higher.

A blog post Sans published shortly after this article was posted expanded the range of vulnerable models to virtually the entire Linksys E product line. Once a device is compromised, it scans the Internet for other vulnerable devices to infect.
“We do not know for sure if there is a command and control channel yet,” Ullrich wrote in the update. “But the worm appears to include strings that point to a command and control channel.

The worm also includes basic HTML pages with images that look benign and more like a calling card.

They include images based on the movie “The Moon” which we used as a name for the worm.”
6

Leave a Reply