{"id":34076,"date":"2020-03-27T16:10:00","date_gmt":"2020-03-27T16:10:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/d\/d-id\/1337430"},"modified":"2020-03-27T16:10:00","modified_gmt":"2020-03-27T16:10:00","slug":"purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/","title":{"rendered":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header>\n<\/header>\n<p><span class=\"strong black\">The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.<\/span> <\/p>\n<p class=\"p1\">A cybercriminal group has started scanning the Internet for vulnerable Linksys routers in the first stage of an attack that ultimately aims to fool users into downloading and installing malware, security firm Bitdefender stated in an advisory this week.<\/p>\n<p class=\"p2\">The attack first compromises vulnerable routers by purportedly trying weak or default credentials and mainly targeting Linksys routers, the company said. Once an attacker gains access, they hijack DNS functionality, redirecting victims to a page that attempts to convince them to download a malicious, information-stealing program known as Oski. The attacker&#8217;s page aims to harness the fear of the coronavirus pandemic to fool victims.<\/p>\n<p class=\"p1\">Bitdefender discovered the attack after several users found their browsing blocked by the company&#8217;s program, even though they were trying to visit legitimate sites.<\/p>\n<p class=\"p2\">&#8220;The attack is not subtle,&#8221; says Liviu Arsene, global cybersecurity research at Bitdefender. &#8220;The page does not necessarily look legitimate, but considering that this is an attack that targets home users and home routers, the victims may not have the expertise to figure that out.&#8221;<\/p>\n<p class=\"p1\">The attack joins a <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/attack-surface-vulnerabilities-increase-as-orgs-respond-to-covid-19-crisis\/d\/d-id\/1337369\" target=\"_blank\" rel=\"noopener noreferrer\">general rise in malicious activity<\/a> aimed at home users as many of the world&#8217;s knowledge workers are sequestered at home in an effort to blunt the spread of the novel coronavirus. About 1,200 users have seemingly downloaded the malware between March 18 and March 23, the company said.<\/p>\n<p class=\"p2\">Multiple security firms have warned that attackers are using coronavirus-themed messages to attempt to lure users into clicking on malicious links.&nbsp;<\/p>\n<p class=\"p2\">&#8220;While it&#8217;s not uncommon for hackers to piggyback global news, such as the pandemic, to deliver phishing emails laced with tainted attachments, this recent development proves they are nothing if not creative in compromising victims,&#8221; Bitdefender <a href=\"https:\/\/labs.bitdefender.com\/2020\/03\/new-router-dns-hijacking-attacks-abuse-bitbucket-to-host-infostealer\/\" target=\"_blank\" rel=\"noopener noreferrer\">stated in a blog post on the attack<\/a>.<\/p>\n<p class=\"p2\">The attackers are focused on the US and European countries, according to the company&#8217;s analysis. The US, Germany, and France account for 73% of the targeted routers.&nbsp;<\/p>\n<p class=\"p1\">The attack targets a list of legitimate Web pages and domains, including:<\/p>\n<ul>\n<li>aws.amazon.com<\/li>\n<li>goo.gl<\/li>\n<li>bit.ly<\/li>\n<li>washington.edu<\/li>\n<li>imageshack.us<\/li>\n<li>ufl.edu<\/li>\n<li>disney.com<\/li>\n<li>cox.net<\/li>\n<li>xhamster.com<\/li>\n<li>pubads.g.doubleclick.net<\/li>\n<li>tidd.ly<\/li>\n<li>redditblog.com<\/li>\n<li>iddler2.com<\/li>\n<li>winimage.com<\/li>\n<\/ul>\n<p class=\"p2\">When a user attempts to go to one of those domains, the compromised router&#8217;s settings will send them to an attacker-controlled site claiming to be distributing a COVID information application from the World Health Organization. If the user clicks through to the landing page, they will be download a program from one of four Bitbucket repositories, Bitdefender stated in its analysis.<\/p>\n<p class=\"p2\">The program is a downloader that installs Oski, a relatively new Trojan&nbsp;developed in 2019.<\/p>\n<p class=\"p2\">&#8220;Some of the features that it packs revolve around extracting browser credentials and cryptocurrency wallet passwords, and its creators even brag that it can extract credentials stored in SQL databases of various Web browsers and Windows Registry,&#8221; the company said.<\/p>\n<p class=\"p2\">The attack is not the first time cybercriminals have used a legitimate software storage service as a distribution mechanism. Both GitHub and Bitbucket have been used by attackers in the past.&nbsp;<\/p>\n<p class=\"p2\">Bitdefender&#8217;s researchers believe the original compromise is accomplished by a brute-force attack of either the router itself or the Linksys Cloud account, which can be used to remotely manage a router. The attack could be using a vulnerability or other method, Arsene says. However, all evidence points to a broad brute-force scanning attack as the main culprit.<\/p>\n<p class=\"p2\">With so many workers using home networks and systems to connect to their companies&#8217; systems, such weakly secured routers are not just a consumer problem but an enterprise one as well, Arsene says.<\/p>\n<p class=\"p2\">&#8220;The router is the home user&#8217;s gateway to the Internet,&#8221; he says. &#8220;If you don&#8217;t disable the Linksys cloud account or you don&#8217;t update your firmware, it is game over for your entire network infrastructure.&#8221;<\/p>\n<p class=\"p3\"><strong>Related Content:<\/strong><\/p>\n<p class=\"p4\"><strong>Check out<\/strong> <a href=\"https:\/\/www.darkreading.com\/edge.asp\"><strong>The Edge<\/strong><\/a><strong>, Dark Reading&#8217;s new section for features, threat data, and in-depth perspectives.&nbsp;Today&#8217;s top story: &#8220;<a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/how-to-evict-attackers-living-off-your-land\/b\/d-id\/1337420\" target=\"_blank\" rel=\"noopener noreferrer\">How to Evict Attackers Living Off Your Land<\/a>.&#8221;<\/strong><\/p>\n<p> <span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/d\/d-id\/1337430?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware. Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/d\/d-id\/1337430?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-34076","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-27T16:10:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely\",\"datePublished\":\"2020-03-27T16:10:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/\"},\"wordCount\":755,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/\",\"name\":\"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2020-03-27T16:10:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/","og_locale":"en_US","og_type":"article","og_title":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-27T16:10:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely","datePublished":"2020-03-27T16:10:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/"},"wordCount":755,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/","url":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/","name":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2020-03-27T16:10:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/purported-brute-force-attack-aims-at-linksys-routers-as-more-people-work-remotely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34076"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34076\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}