China’s cyberthreats infiltrate home routers: FBI releases shocking report

February 4, 2024
1 min read

– The FBI has issued a warning about Chinese hackers hijacking internet routers.
– The attacks target older routers with outdated security made by Cisco and NetGear.
– Hackers can install malware on the routers to launch cyberattacks on critical U.S. infrastructure.
– The FBI has taken down hundreds of infected routers and urges people to update their routers and disable remote access.

The FBI has alerted the public to a new cyberthreat from China, warning that internet routers are being “hijacked” by Chinese hackers. The attacks specifically target older routers with outdated security made by Cisco and NetGear. By secretly installing malware on these routers, hackers can use them to launch cyberattacks on important U.S. infrastructure. The FBI has already taken down “hundreds” of infected routers. FBI Director Christopher Wray has stated that Chinese hackers are preparing to cause real-world harm to American citizens and communities. Cyber experts advise protecting oneself by regularly updating routers, disabling remote access, and replacing routers that are 10-15 years old. In addition to router hijacking, another form of cyberattack linked to China involves exploiting remote login technology to steal sensitive information. Federal agencies that use the affected systems have been instructed to disconnect and install necessary patches to prevent further breaches. If anyone suspects their home or business router has been hacked, the FBI encourages the use of the website to make a report.

Latest from Blog

Top 3 Cybersecurity Stocks for May 2024 Buy Now

TLDR: Key Points: Cybersecurity stocks are using AI to enhance their platforms Top cybersecurity stocks to buy now include Crowdstrike, Fortinet, and Palo Alto Networks Article Summary: The cybersecurity market is booming

Get Secure: Know the Basics of Cloud Security Fundamentals Now

TLDR: Cloud security fundamentals are essential for data protection, regulatory compliance, and access management in a cloud environment. Key fundamentals include identifying assets, implementing security controls, conducting risk assessments, managing user access