www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
  • en English▼
    af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Urgent Cybersecurity Threat: Cleaning Up Routers Infected by Russia’s APT28 Hacker Group (Moobot Malware)
Share
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > Urgent Cybersecurity Threat: Cleaning Up Routers Infected by Russia’s APT28 Hacker Group (Moobot Malware)
MalwareTrojans

Urgent Cybersecurity Threat: Cleaning Up Routers Infected by Russia’s APT28 Hacker Group (Moobot Malware)

riviTMedia Research
Last updated: January 16, 2025 8:53 pm
riviTMedia Research
Share
Urgent Cybersecurity Threat: Cleaning Up Routers Infected by Russia's APT28 Hacker Group (Moobot Malware)
SHARE

In recent developments, the US government has taken significant action to combat the cyberespionage efforts of the Russian APT28 hacker group, also known as Fancy Bear or Sednit. This group, which has been linked to numerous high-profile cyberattacks, recently launched an attack that involved infecting routers with a malware called Moobot. This attack specifically targeted small office/home office (SOHO) routers and is a reminder of the dangers posed by unsecured network infrastructure. Here, we break down the details of the Moobot malware attack, offer a comprehensive removal guide, and provide preventive methods for avoiding future infections.

Contents
Details of the Moobot Malware AttackDownload SpyHunter Now & Scan Your Computer For Free!Removing Moobot MalwareDownload SpyHunter Now & Scan Your Computer For Free!Step 1: Install SpyHunterStep 2: Run a Full System ScanStep 3: Review Scan ResultsStep 4: Remove the ThreatsStep 5: Reset Your RouterPreventive Methods to Avoid Future InfectionsUse Strong, Unique PasswordsEnable Multi-Factor Authentication (MFA)Update Firmware and Software RegularlyDisable Remote AccessInstall Security SoftwareMonitor Network TrafficConclusionDownload SpyHunter Now & Scan Your Computer For Free!

Details of the Moobot Malware Attack

The Moobot malware, which was used by APT28, compromised a botnet of Ubiquiti routers primarily used in SOHO environments. These routers were infected by exploiting default credentials and a trojanized OpenSSH server. Once inside the routers, APT28 actors took control of the devices, utilizing them for a variety of covert activities aimed at sensitive sectors across the globe. Below is a summary table of the details of this attack:

CategoryDetails
Threat TypeMalware (Moobot), Cyberespionage
Detection Names“Moobot”, “APT28”, “Fancy Bear”, “Sednit”
Symptoms of Infection– Slow internet speeds
– Unusual router activity or settings
– Sudden changes in router configurations
Damage– Compromise of sensitive data
– Unauthorized access to targeted systems
– Deployment of further malicious payloads
Distribution Methods– Exploitation of default credentials
– Trojanized OpenSSH server processes
Danger LevelHigh (Cyber espionage, potential for massive data breaches and system infiltration)

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!

Download SpyHunter 5
Download SpyHunter for Mac

APT28’s sophisticated tactics included exploiting zero-day vulnerabilities, leveraging the compromised routers for command-and-control (C2) infrastructure, and deploying custom backdoors like MasePie. This backdoor was designed to establish reverse proxy connections and SSH tunnels, which made it difficult to detect and remove the malware.


Removing Moobot Malware

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It's FREE!

Download SpyHunter 5
Download SpyHunter for Mac

If you believe your device or network might be infected with Moobot malware, it's critical to act immediately. The best course of action involves using an advanced anti-malware tool like SpyHunter to scan, detect, and remove the infection from your system. Below is a step-by-step guide to help you through the removal process:

Step 1: Install SpyHunter

  1. Download SpyHunter: Download the latest version of the program. Ensure that you are downloading the correct version for your operating system.
  2. Install SpyHunter: Once the download is complete, run the installation file. Follow the on-screen instructions to complete the installation process.
Download SpyHunter 5
Download SpyHunter for Mac

Step 2: Run a Full System Scan

  1. Launch SpyHunter: Open SpyHunter and allow it to update its malware definitions.
  2. Start the Scan: Click the "Scan" button to initiate a thorough scan of your system. This will check for malware, including Moobot, and other potential threats.
  3. Wait for the Scan to Finish: Depending on your system’s size, the scan may take some time. Be patient as SpyHunter performs an in-depth analysis.

Step 3: Review Scan Results

  1. Check for Infections: Once the scan is complete, review the results to see if Moobot or any other malicious files are detected.
  2. Identify Potential Threats: SpyHunter will provide a list of identified threats. You can click on each threat for more detailed information about its nature and impact.

Step 4: Remove the Threats

  1. Select the Infected Items: Choose the malware items listed for removal. SpyHunter allows you to select specific threats for removal or choose to delete all identified threats.
  2. Initiate Removal: After selecting the threats, click on the "Remove" button to eliminate the malicious files from your system.
  3. Restart Your System: Once the removal is complete, restart your computer to ensure all changes take effect.

Step 5: Reset Your Router

Since APT28 targeted routers in this attack, it is crucial to factory reset your router and apply recommended updates:

  1. Factory Reset: Follow the router’s manual to perform a factory reset.
  2. Update Firmware: Ensure that your router's firmware is up to date with the latest patches provided by the manufacturer.
  3. Change Default Credentials: Change the default username and password to strong, unique credentials.
  4. Configure Firewalls: Set up appropriate firewall rules to further secure your network.

Preventive Methods to Avoid Future Infections

Preventing future infections is crucial, especially given the ongoing nature of cyberespionage activities by APT28. Below are key preventive measures to safeguard your network and devices from similar threats:

Use Strong, Unique Passwords

Ensure that all devices on your network, including routers and IoT devices, are secured with strong, unique passwords. Avoid using default login credentials and employ a password manager to generate and store complex passwords.

Enable Multi-Factor Authentication (MFA)

Enable MFA wherever possible, especially for accounts with administrative access. This adds an additional layer of protection by requiring a second form of verification.

Update Firmware and Software Regularly

Keep your router’s firmware and any software on your devices up to date. Regularly check for updates and apply security patches to minimize vulnerabilities that could be exploited by attackers.

Disable Remote Access

Disable remote management features on your router unless absolutely necessary. This reduces the risk of external attackers gaining control over your router.

Install Security Software

Utilize comprehensive anti-malware software, such as SpyHunter, to provide continuous protection against a wide range of threats. Regularly update your security software to ensure it can detect the latest threats.

Monitor Network Traffic

Regularly monitor the traffic on your network for any unusual activity. If you notice an increase in traffic or unfamiliar devices connected to your network, investigate the issue immediately.


Conclusion

The Moobot malware attack carried out by APT28 has once again demonstrated the dangers posed by cyberespionage and the critical importance of securing network infrastructure. Organizations and individuals must act swiftly to address any potential infections, and SpyHunter provides a robust solution for detecting and removing the malware. By following the outlined preventive measures, you can strengthen your network defenses and avoid falling victim to similar cyber threats in the future.

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It's FREE!

Download SpyHunter 5
Download SpyHunter for Mac

You Might Also Like

Win32/Injector.EDTQ: Detection, and Removal
How to Remove ArchiveAccess Adware
PLAYFULGHOST Malware and Its Removal
Arid Spy Mobile Malware: A Comprehensive Guide
Marcher Malware: A Banking Trojan Targeting Android Devices
TAGGED:anti-malware toolsAPT28APT28 malwarecompromised router fixcyber attack preventioncyber espionagecyberespionage preventiondefault credentialsFancy BearFancy Bear threatmalware removalMasePie backdoorMoobot botnetMoobot malwareMoobot malware symptomsMoobot removal guidenetwork securityprotect routersPython backdoor removalPython malwarerouter infection preventionrouter malware removalrouter securityRussia cyberattacksecure network routersSednitSOHO router infectionSpyHunterSpyHunter removal toolSpyHunter reviewUbiquiti router infectionzero-day vulnerabilities

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

Your Details

Let us know how to get back to you.

Example: user@website.com
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Hermit Malware: Identification and Prevention
Next Article Pulpysearch Browser Hijacker
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Your Details

Let us know how to get back to you.

Example: user@website.com
www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US