October 6, 2015 By Shane Schick 2 min read

The reemergence of the Linux.Wifatch router virus may turn out be an unusual case of a cybercriminal working to defend consumers against other malware rather than doing any direct damage or stealing data.

Symantec researchers said Linux.Wifatch, which has also been called Zollard and Reincarna, has been active since for the last two years. Once it infects a home router, however, its main function has been to keep botnets and other threats off the device. As CSO Online reported, the virus has infiltrated networks through the same weak passwords associated with similar malware but remains fairly visible to third-party inspection and even offers code to assist with debugging.

The Verge suggested the Linux.Wifatch router virus is actually an attempt to ward off government surveillance from agencies such as the National Security Agency (NSA). Its source code, for example, includes a comment from free software advocate Richard Stallman that urges prying eyes to defend the constitutional rights of citizens. Perhaps because it hasn’t caused any trouble on its own, Symantec suggested Linux.Wifatch is widespread across tens of thousands of devices, but there has yet to be a concrete estimate.

Though its creator remains unknown, ITProPortal observed that whoever is behind Linux.Wifatch is well aware of how a home router can be used to distribute updates without the owner’s permission. There may be some altruistic motives in this case, but unless more users update their firmware and use better passwords, such holes could create security nightmares as more devices become connected via the Internet of Things (IoT).

As with any form of vigilante justice, it may be up to the public to decide they are better positioned to look after themselves. Forbes said that Linux.Wifatch primarily checks Telnet ports for suspicious activity and, if necessary, renders it inoperable. Users are usually then requested to update their router, but that’s not really the kind of safeguard the average consumer or business would want to count on.

Even if this turns out to be a white-hat virus, as International Business Times described it, router users should take the steps necessary to have it removed. Symantec researchers suggested that repeat infections are likely. Even if some of us owe Linux.Wifatch a debt of gratitude, leaving security up to those that sneak their way into devices is a sure way to wind up paying dearly later on.

More from

Poland spending $760 million on cybersecurity after attack

3 min read - Visitors to the Polish Press Agency (PAP) website on May 31 at 2 p.m. Polish time were met with an unusual message. Instead of the typical daily news, the state-run newspaper had supposedly published a story announcing that a partial mobilization, which means calling up specific people to serve in the armed forces, was ordered by Polish Prime Minister Donald Tusk beginning on July 1, 2024. Deputy Prime Minister Krzysztof Gawkowski refuted the claim on X (formerly Twitter). His post…

How generative AI Is expanding the insider threat attack surface

3 min read - As the adoption of generative AI (GenAI) soars, so too does the risk of insider threats. This puts even more pressure on businesses to rethink security and confidentiality policies.In just a few years, artificial intelligence (AI) has radically changed the world of work. 61% of knowledge workers now use GenAI tools — particularly OpenAI’s ChatGPT — in their daily routines. At the same time, business leaders, often partly driven by a fear of missing out, are investing billions in tools…

Water facilities warned to improve cybersecurity

3 min read - United States water facilities, which include 150,000 public water systems, have become an increasingly high-risk target for cyber criminals in recent years. This rising threat has demanded more attention and policies focused on improving cybersecurity.Water and wastewater systems are one of the 16 critical infrastructures in the U.S. The definition for inclusion in this category is that the industry must be so crucial to the United States that “the incapacity or destruction of such systems and assets would have a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today