Arcadyan routers are running firmware that is affected by a critical security vulnerability. This vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code on the router.
Bypass Authentication and Remote Root Shell on Arcadyan Routers
attack by new mirai malware
New Mirai Malware Targets Routers Running Arcadyan Firmware
Arcadyan is a firmware manufacturer for routers, switches, and other network infrastructure equipment. Recently, there has been a spate of new malware variants targeting routers running Arcadyan firmware.
The malware variants are typically variations of the Mirai botnet, which is a family of malware that can exploit vulnerabilities in network gear to carry out distributed denial-of-service (DDoS) attacks.
The new malware variants exploit a vulnerability in Arcadyan routers that was first identified in March. The vulnerability is a result of the way Arcadyan routers handle the Telnet protocol.
Once attackers have access to a router running Arcadyan firmware, they can use the Mirai botnet to launch DDoS attacks.
Arcadyan is warning customers of the vulnerability and is offering a patch to fix the problem.
Running Routers at Risk of New Mirai Attack
Protect Your Router from New Mirai Malware Variant
New Mirai Variant attacking Arcadyan Routers
How to Protect Your Router from the New Mirai Malware
Arcadian Networks is aware of a new Mirai malware variant targeting routers running its Arcadyan firmware. This variant of Mirai targets routers with default and easily accessible passwords, allowing attackers to gain access to devices and their network traffic. Arcadian recommends users change their router passwords and install updated firmware to protect their devices from this attack.
What is Mirai?
Mirai is a malware strain that was used in the recent attacks on major websites, such as Twitter and Netflix. Mirai uses a variety of methods, such as brute force attacks, to gain access to devices on a network. Once infected, Mirai can use devices on the network to launch further attacks, such as the recent attack that took down the internet in 2017 by taking down major websites.
How does the new Mirai variant attack routers?
The new Mirai variant targets routers with default and easily accessible passwords. This allows attackers to gain access to devices and their network traffic. Attackers can use this access to launch further attacks, such as the recent attack that took down the internet in 2017.
How can users protect themselves from this attack?
Arcadian Networks recommends users change their router passwords and install updated firmware to protect their devices from this attack. Additionally, users can use a firewall to protect their devices and network traffic from unauthorized access.
The routers running arcadyan firmware are vulnerable to a remote code execution vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code on the affected device.