October 6, 2015 By Shane Schick 2 min read

The reemergence of the Linux.Wifatch router virus may turn out be an unusual case of a cybercriminal working to defend consumers against other malware rather than doing any direct damage or stealing data.

Symantec researchers said Linux.Wifatch, which has also been called Zollard and Reincarna, has been active since for the last two years. Once it infects a home router, however, its main function has been to keep botnets and other threats off the device. As CSO Online reported, the virus has infiltrated networks through the same weak passwords associated with similar malware but remains fairly visible to third-party inspection and even offers code to assist with debugging.

The Verge suggested the Linux.Wifatch router virus is actually an attempt to ward off government surveillance from agencies such as the National Security Agency (NSA). Its source code, for example, includes a comment from free software advocate Richard Stallman that urges prying eyes to defend the constitutional rights of citizens. Perhaps because it hasn’t caused any trouble on its own, Symantec suggested Linux.Wifatch is widespread across tens of thousands of devices, but there has yet to be a concrete estimate.

Though its creator remains unknown, ITProPortal observed that whoever is behind Linux.Wifatch is well aware of how a home router can be used to distribute updates without the owner’s permission. There may be some altruistic motives in this case, but unless more users update their firmware and use better passwords, such holes could create security nightmares as more devices become connected via the Internet of Things (IoT).

As with any form of vigilante justice, it may be up to the public to decide they are better positioned to look after themselves. Forbes said that Linux.Wifatch primarily checks Telnet ports for suspicious activity and, if necessary, renders it inoperable. Users are usually then requested to update their router, but that’s not really the kind of safeguard the average consumer or business would want to count on.

Even if this turns out to be a white-hat virus, as International Business Times described it, router users should take the steps necessary to have it removed. Symantec researchers suggested that repeat infections are likely. Even if some of us owe Linux.Wifatch a debt of gratitude, leaving security up to those that sneak their way into devices is a sure way to wind up paying dearly later on.

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today