October 6, 2015 By Shane Schick 2 min read

The reemergence of the Linux.Wifatch router virus may turn out be an unusual case of a cybercriminal working to defend consumers against other malware rather than doing any direct damage or stealing data.

Symantec researchers said Linux.Wifatch, which has also been called Zollard and Reincarna, has been active since for the last two years. Once it infects a home router, however, its main function has been to keep botnets and other threats off the device. As CSO Online reported, the virus has infiltrated networks through the same weak passwords associated with similar malware but remains fairly visible to third-party inspection and even offers code to assist with debugging.

The Verge suggested the Linux.Wifatch router virus is actually an attempt to ward off government surveillance from agencies such as the National Security Agency (NSA). Its source code, for example, includes a comment from free software advocate Richard Stallman that urges prying eyes to defend the constitutional rights of citizens. Perhaps because it hasn’t caused any trouble on its own, Symantec suggested Linux.Wifatch is widespread across tens of thousands of devices, but there has yet to be a concrete estimate.

Though its creator remains unknown, ITProPortal observed that whoever is behind Linux.Wifatch is well aware of how a home router can be used to distribute updates without the owner’s permission. There may be some altruistic motives in this case, but unless more users update their firmware and use better passwords, such holes could create security nightmares as more devices become connected via the Internet of Things (IoT).

As with any form of vigilante justice, it may be up to the public to decide they are better positioned to look after themselves. Forbes said that Linux.Wifatch primarily checks Telnet ports for suspicious activity and, if necessary, renders it inoperable. Users are usually then requested to update their router, but that’s not really the kind of safeguard the average consumer or business would want to count on.

Even if this turns out to be a white-hat virus, as International Business Times described it, router users should take the steps necessary to have it removed. Symantec researchers suggested that repeat infections are likely. Even if some of us owe Linux.Wifatch a debt of gratitude, leaving security up to those that sneak their way into devices is a sure way to wind up paying dearly later on.

More from

ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive?

2 min read - After reading about the recent cybersecurity research by Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially impressed that ChatGPT 4 can exploit the vast majority of one-day vulnerabilities, I started thinking about what the results really mean in the grand scheme of cybersecurity. Most importantly, I wondered how a human cybersecurity professional’s results for the same tasks would compare.To get some answers, I talked with Shanchieh Yang, Director of Research at the Rochester Institute…

ONCD releases request for information: Open-source software security

3 min read - Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working on the coding, security measures are often overlooked, increasing the chances that a vulnerability will fall through the cracks and be exploited. The Open-Source Software Security Initiative (OS31) aims to provide governance over open-source security processes. After the Log4Shell vulnerability, securing open-source software became a top priority for the federal…

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today