
Bill to study national security risks in routers passes House committee
The legislation calls for a Commerce Department examination of routers, modems and other devices controlled by U.S. adversaries.
The legislation calls for a Commerce Department examination of routers, modems and other devices controlled by U.S. adversaries.
FBI, NSA and CISA officials warn that Volt Typhoon actors are “pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions.”
Volt Typhoon used privately owned routers infected with malware in attempt to conceal activity, DOJ says.
Hackers are able to use common exploits and open-source tools to obfuscate their activity, the agencies say.
Botnets are hard to sink, Part Infinity.
The findings underscore the challenge of improving security in a market that prizes cheap and functional networking equipment.
Looks can be deceiving when a security researcher first studies a piece of code.
It’s only the latest example of security technology introducing new gateways of attack into a user’s home.
Patches are available for both vulnerabilities, and hackers would need physical access in both cases to carry out an attack.
Analysts with Recorded Future say the stolen drone documents appear to be legitimate, having come from an enlisted captain that’s currently stationed at a Nevada-based U.S. Air Force facility.