Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now


tp-link-deco-be77-image-2-vents.png

Cesar Cadenas/ZDNET

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • The FBI and NSA are warning of new threats targeting routers.
  • Attacks from Russian hackers can compromise your router.
  • Update the firmware and tighten your router password.

When was the last time you updated or restarted your router? As long as your internet is working, you may set up your router and then forget about it. But based on new alerts from US federal agencies, that’s not such a good idea.

In new advisories published this week, both the FBI and NSA warned of Russian hackers targeting vulnerable routers around the world to steal sensitive information. Though the attackers are mostly interested in military and government secrets, home and small office users are also at risk. That’s because the attackers will hijack SOHO (small office, home office) routers from which they can stage their attacks.

Also: Your home Wi-Fi isn’t nearly as private as it should be – 6 free ways to lock it down

In one recent incident, the US Department of Justice and the FBI disrupted a network of compromised SOHO routers that the Russian GRU (General Staff Main Intelligence Directorate) had exploited to carry out malicious DNS hijacking operations. As Russia’s military-based spy agency, the GRU is infamous for committing acts of espionage and more violent types of attacks against foreign adversaries.

In its warnings, the FBI and NSA announced that members of the GRU cybercrime group APT28 (aka Fancy Bear and Forest Blizzard) have been stealing login credentials from compromised routers, including older, legacy TP-Link routers. In its own advisory for the CVE-2023-50224 vulnerability, TP-Link said that many of its products are affected, but that all of them have reached end-of-life status, which means they are no longer supported by the company.

Also: A $30 router with a built-in VPN? I had to try it – and haven’t had any regrets

The US government has already been weighing a ban of TP-Link routers, charging that the devices are vulnerable to security threats and are tied to China as the manufacturer’s country of origin. The company has fought back against these charges, arguing that China has no control over its products and that all the core data security functions are handled within the US.

Beyond TP-Link’s status, the FBI and NSA clearly see Russia’s GRU as a threat.

“The GRU has harvested passwords, authentication tokens, and sensitive information, including emails and web browsing information normally protected by secure socket layer (SSL) and transport layer security (TLS) encryption,” the FBI revealed. “The GRU has indiscriminately compromised a wide pool of US and global victims and then filtered down impacted users, especially targeting information related to military, government, and critical infrastructure.”

How to protect your router (and yourself)

Whether or not your router is vulnerable to these types of attacks, there are certain steps you should take to protect your device, your data, and yourself.

1. Change your router password

Every router comes with a default username and password to access its firmware. (This is different than the password you create for your Wi-Fi network.) But sticking with the default credentials is risky, so you should change them ASAP. 

Also: Traditional Wi-Fi router vs. mesh: How to decide between the 2 popular networking options

Sign in to your router’s firmware, look for the password setting, and set a new one. Follow the same advice you normally would when creating a strong password–something complex but memorable. You can also use a passphrase, which is just as secure as a good password, if not more so, and can be easier to remember.

2. Update the firmware

Router manufacturers periodically roll out new firmware in response to security holes and other bugs. In your router’s firmware, check the firmware update setting to see if any new versions are available, and then download and install them.

3. Upgrade an older router

An older, legacy router that has reached end-of-life status may no longer be supported by the manufacturer. That means you won’t receive firmware updates or security patches. To check your current router’s status, run a search for it or contact the manufacturer. If your router falls into this end-of-life category, replace it with a newer model that is supported.

4. Disable or tighten remote management

Most routers offer ways for you to manage or access them remotely from the public internet. That’s certainly convenient, but it can open up your device to hackers, especially if your password is weak or the router is otherwise vulnerable. Review the firmware settings to see if remote access is enabled. If so, consider disabling it or tightening the overall security to prevent unauthorized access.

Also: It’s time to admit your router’s built-in firewall isn’t enough – here’s what is

5. Periodically restart your router

Here’s one more piece of advice from an NSA Best Practices document. To combat any nonpersistent malware that may reside on your router, consider restarting it periodically, as often as once a week. This will remove any lingering, nonpersistent infections. If you already restart your router from time to time to deal with internet problems, then this is one more reason to do so.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


After being teased in the second beta, the new “Bubbles” feature is finally available in Android 17 Beta 3. This is the biggest change to Android multitasking since split-screen mode. I had to see how it worked—come along with me.

Now, it should be mentioned that this feature will probably look a bit familiar to Samsung Galaxy owners. One UI also allows for putting apps in floating windows, and they minimize into a floating widget. However, as you’ll see, Google’s approach is more restrained.

App Bubbles in Android 17

There’s a lot to like already

First and foremost, putting an app in a “Bubble” allows it to be used on top of whatever’s happening on the screen. The functionality is essentially identical to Android’s older feature of the exact same name, but now it can be used for apps in addition to messaging conversations.

To bubble an app, simply long-press the app icon anywhere you see it. That includes the home screen, app drawer, and the taskbar on foldables and tablets. Select “Bubble” or the small icon depicting a rectangle with an arrow pointing at a dot in the menu.

Bubbles on a phone screen

The app will immediately open in a floating window on top of your current activity. This is the full version of the app, and it works exactly how it would if you opened it normally. You can’t resize the app bubble, but on large-screen devices, you can choose which side it’s on. To minimize the bubble, simply tap outside of it or do the Home gesture—you won’t actually go to the Home Screen.

Multiple apps can be bubbled together—just repeat the process above—but only one can be shown at a time. This is a key difference compared to One UI’s pop-up windows, which can be resized and tiled anywhere on the screen. Here is also where things vary depending on the type of device you’re using.

If you’re using a phone, the current bubbled apps appear in a row of shortcuts above the window. Tap an app icon, and it will instantly come into view within the bubble. On foldables and tablets, the row of icons is much smaller and below the window.

Another difference is how the app bubbles are minimized. On phones, they live in a floating app icon (or stack of icons) on the edge of the screen. You are free to move this around the screen by dragging it. Tapping the minimized bubble will open the last active app in the bubble. On foldables and tablets, the bubble is minimized to the taskbar (if you have it enabled).

Bubbles on a foldable screen

Now, there are a few things to know about managing bubbles. First, tapping the “+” button in the shortcuts row shows previously dismissed bubbles—it’s not for adding a new app bubble. To dismiss an app bubble, you can drag the icon from the shortcuts row and drop it on the “X” that appears at the bottom of the screen.

To remove the entire bubble completely, simply drag it to the “X” at the bottom of the screen. On phones, there’s also an extra “Manage” button below the window with a “Dismiss bubble” option.

Better than split-screen?

Bubbles make sense on smaller screens

That’s pretty much all there is to it. As mentioned, there’s definitely not as much freedom with Bubbles as there is with pop-up windows in One UI. The latter allows you to treat apps like windows on a computer screen. Bubbles are a much more confined experience, but the benefit is that you don’t have to do any organizing.

Samsung One UI pop-up windows

Of course, Android has supported using multiple apps at once with split-screen mode for a while. So, what’s the benefit of Bubbles? On phones, especially, split-screen mode makes apps so small that they’re not very useful.

If you’re making a grocery list while checking the store website, you’re stuck in a very small browser window. Bubbles enables you to essentially use two apps in full size at the same time—it’s even quicker than swiping the gesture bar to switch between apps.

If you’d like to give App Bubbles a try, enroll your qualified Pixel phone in the Android Beta Program. The final release of Android 17 is only a few months away (Q2 2026), but this is an exciting feature to check out right now.

A desktop setup featuring an Android phone, monitor, and mascot, surrounded by red 'missing' labels


Android’s new desktop mode is cool, but it still needs these 5 things

For as long as Android phones have existed, people have dreamed of using them as the brains inside a desktop computing setup. Samsung accomplished this nearly a decade ago, but the rest of the Android world has been left out. Android 17 is finally changing that with a new desktop mode, and I tried it out.



Source link