It’s possible the “mystery” they refer to could be related to the identity of the hacker(s), how it got onto the routers in the first place, or the purpose for the attack
The second unique aspect is that this campaign was confined to a particular ASN. Most previous campaigns we’ve seen target a specific router model or common vulnerability and have effects across multiple providers’ networks. In this instance, we observed that both Sagemcom and ActionTec devices were impacted at the same time, both within the same provider’s network.This led us to assess it was not the result of a faulty firmware update by a single manufacturer, which would normally be confined to one device model or models from a given company.
Our analysis of the Censys data shows the impact was only for the two in question. This combination of factors led us to conclude the event was likely a deliberate action taken by an unattributed malicious cyber actor, even if we were not able to recover the destructive module.
“Mystery” is a term I’d use if there was no explanation for how something could have happened. They are pretty sure they know what and how. They just don’t have proof. Either way , I’ve already spent more time on this thread than it deserves. Take care.
It’s possible the “mystery” they refer to could be related to the identity of the hacker(s), how it got onto the routers in the first place, or the purpose for the attack
The headline reads: “Mystery malware … “
Not sure what you’re on about.
English aint Lojban, if you know what I mean.
“Mystery” is a term I’d use if there was no explanation for how something could have happened. They are pretty sure they know what and how. They just don’t have proof. Either way , I’ve already spent more time on this thread than it deserves. Take care.