14,000 Routers Infected by Takedown-Resistant Malware in Ongoing Campaign

Available in: 中文
2026-03-22T12:08:03.000Z·2 min read
A takedown-resistant malware campaign has infected 14,000+ routers globally using P2P architecture, encrypted communications, and multi-stage persistence to survive cleanup efforts.

14,000 Routers Infected by Takedown-Resistant Malware in Ongoing Campaign

Security researchers have identified a widespread malware campaign that has infected approximately 14,000 routers across multiple countries with malware specifically designed to resist takedown efforts. The campaign represents a significant evolution in persistent network infrastructure attacks.

The Malware: Design for Resilience

The malware incorporates several features specifically designed to survive cleanup efforts:

Scale and Scope

The Threat

Infected routers serve multiple malicious purposes:

  1. Proxy networks: Routers are used as relay nodes for other attacks
  2. Traffic interception: Man-in-the-middle attacks on connected devices
  3. DDoS amplification: Botnet participation in distributed denial-of-service attacks
  4. Credential harvesting: Intercepting credentials from connected devices

Why Router Malware Is Hard to Fight

Several factors make router malware campaigns particularly challenging:

Mitigation Steps

Source: Ars Technica | Full Report

↗ Original source
← Previous: AI Was Everywhere at GDC 2026 — Except in the Games ThemselvesNext: Jury Finds Musk Owes Damages to Twitter Investors for Fraudulent Takeover Tweets →
Comments0