{"id":125310,"date":"2021-07-22T14:23:25","date_gmt":"2021-07-22T21:23:25","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/07\/home-and-office-routers-come-under-attack"},"modified":"2021-07-22T14:23:25","modified_gmt":"2021-07-22T21:23:25","slug":"home-and-office-routers-come-under-attack","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/07\/home-and-office-routers-come-under-attack","title":{"rendered":"Home and office routers come under attack"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/home-and-office-routers-come-under-attack.jpg\"><\/a><\/p>\n<p><b>Stealth recon and intrusion<\/b><\/p>\n<p>On Wednesday, France\u2019s National Agency for Information Systems Security\u2014abbreviated as ANSSI\u2014warned national businesses and organizations that the group was behind a massive attack campaign that was using hacked routers prior to carrying out reconnaissance and attacks as a means to cover up the intrusions.<\/p>\n<p>\u201cANSSI is currently handling a large intrusion campaign impacting numerous French entities,\u201d an ANSSI <a href=\"https:\/\/www.cert.ssi.gouv.fr\/ioc\/CERTFR-2021-IOC-003\/\">advisory<\/a> warned. \u201cAttacks are still ongoing and are led by an intrusion set publicly referred to as APT31. It appears from our investigations that the threat actor uses a network of compromised home routers as operational relay boxes in order to perform stealth reconnaissance as well as attacks.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stealth recon and intrusion On Wednesday, France\u2019s National Agency for Information Systems Security\u2014abbreviated as ANSSI\u2014warned national businesses and organizations that the group was behind a massive attack campaign that was using hacked routers prior to carrying out reconnaissance and attacks as a means to cover up the intrusions. \u201cANSSI is currently handling a large intrusion [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,34,15],"tags":[],"class_list":["post-125310","post","type-post","status-publish","format-standard","hentry","category-business","category-cybercrime-malcode","category-habitats"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/125310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=125310"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/125310\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=125310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=125310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=125310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}