October 6, 2015 By Shane Schick 2 min read

The reemergence of the Linux.Wifatch router virus may turn out be an unusual case of a cybercriminal working to defend consumers against other malware rather than doing any direct damage or stealing data.

Symantec researchers said Linux.Wifatch, which has also been called Zollard and Reincarna, has been active since for the last two years. Once it infects a home router, however, its main function has been to keep botnets and other threats off the device. As CSO Online reported, the virus has infiltrated networks through the same weak passwords associated with similar malware but remains fairly visible to third-party inspection and even offers code to assist with debugging.

The Verge suggested the Linux.Wifatch router virus is actually an attempt to ward off government surveillance from agencies such as the National Security Agency (NSA). Its source code, for example, includes a comment from free software advocate Richard Stallman that urges prying eyes to defend the constitutional rights of citizens. Perhaps because it hasn’t caused any trouble on its own, Symantec suggested Linux.Wifatch is widespread across tens of thousands of devices, but there has yet to be a concrete estimate.

Though its creator remains unknown, ITProPortal observed that whoever is behind Linux.Wifatch is well aware of how a home router can be used to distribute updates without the owner’s permission. There may be some altruistic motives in this case, but unless more users update their firmware and use better passwords, such holes could create security nightmares as more devices become connected via the Internet of Things (IoT).

As with any form of vigilante justice, it may be up to the public to decide they are better positioned to look after themselves. Forbes said that Linux.Wifatch primarily checks Telnet ports for suspicious activity and, if necessary, renders it inoperable. Users are usually then requested to update their router, but that’s not really the kind of safeguard the average consumer or business would want to count on.

Even if this turns out to be a white-hat virus, as International Business Times described it, router users should take the steps necessary to have it removed. Symantec researchers suggested that repeat infections are likely. Even if some of us owe Linux.Wifatch a debt of gratitude, leaving security up to those that sneak their way into devices is a sure way to wind up paying dearly later on.

More from

We are moving!

< 1 min read - SecurityIntelligence.com is being sunset, but have no fear!We have a new home for all of your favorite security and X-Force content.Follow us to www.ibm.com/think to maintain access to the stories and news you love, both new and old.Security Intelligence will officially sunset on Friday, March 28, 2025. To access the latest security thought leadership, go here. To access the latest X-Force research, go here.If you are experiencing cybersecurity issues or an incident, contact X-Force® to help:US hotline: 1-888-241-9812 | Global hotline:…

Bypassing Windows Defender Application Control with Loki C2

10 min read - Windows Defender Application Control (WDAC) is a security solution that restricts execution to trusted software. Since it is classified as a security boundary, Microsoft offers bug bounty payouts for qualifying bypasses, making it an active and competitive field of research.Typical outcomes of a WDAC bypass bug bounty submission:Bypass is fixed; possible bounty awardedBypass is not fixed but instead "mitigated" by being added to the WDAC recommended block list. Likely no bounty awarded but honorable mention is typically givenBypass is not…

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today