New 'Chuck Norris' Botnet Infects Routers, Modems
A new botnet that carries the namesake of perhaps the most famous American-born martial arts actor of all time is causing quite a stir across the Internet. The botnet received its name from a comment (written in Italian) in its source code: "in nome di Chuck Norris" which translates: "in the name of Chuck Norris".
So, how does one get infected with the infamous Chuck Norris botnet?
Those who have yet to change the default password on their home router are the most susceptible to an attack.
Norris Infects DSL Modems and Routers
The Chuck Norris botnet is also unusual because it infects DSL modems and routers rather than personal computers. More specifically, it installs itself on routers and modems by guessing default administrative passwords. (Source: buzzbox.com)
The botnet also takes advantage of the fact that many devices are configured to allow remote access. It preys on a known vulnerability in D-Link devices as well.
Once installed in the memory of the router, the botnet blocks remote communication ports and scans the network for other susceptible machines.
This is not the first time a botnet like Chuck Norris has caused an online disturbance. Similar to Psyb0t (a previous botnet model) Chuck Norris can infect an MIPS-based device running the Linux operating system if its administration interface has a weak username and password. (Source: computerworld.com)
Czech Researches Catch Chuck
The Chuck Norris botnet was first discovered by Czech researchers.
Since its discovery, it has not stopped taking advantage of poorly configured routers and DSL modems, according to Jan Vykopal, the head of the network security department with Masaryk University's Institute of Computer Science in Brno, Czech Republic.
While the news may seem a bit bleak, there is one way for honest computer users to wriggle out of the Chuck Norris botnet deathgrip. Since the botnet lives in the RAM (random access memory) of the router, it can be removed via a router restart, which is as easy as unplugging the router and plugging it back in.
Users should also take this opportunity to consider the strength (or weakness) of those vital passwords barring entry to their routers and PCs.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.