Alternately someone who found a vulnerability and decided it was better to 'shut it down' than to leave it open. Personally, I'd rather have my router bricked than compromised. I can diagnose 'it's dead' pretty fast but probably wouldn't notice a compromise for a long time.
🚽 “Call Roto-Rooter…. That’s the name…. They’ll FLUSH your TROUBLES down the Drain!” Damn you people. I can’t get that damn 1970’s jingle out of my head. 🤣
@@ivannasha5556 Lol, no. I just remember how they treated everyone, and how many poor decisions they made as a company. Hands down the worst job I've ever had.
from what I've seen ISP use default password and remote administration can't be disabled even blocking the port, only by forwarding the port to local port, and telling anyone in the company about this 10+ year old vulnerability is scoffed at, or your told it's not a problem, and they suddenly retire the next month, your emails will go unanswered.
That's what I was thinking. At least he bricked them before someone else did much worse with them. Hopefully the vulnerability is taken seriously and fixed. The cost to replace the routers should make them take it seriously.
Yeah it's an arm based computer running a firewall, DHCP server, arp and other such services. You can just install OPNsense in an old PC and have a better router than any consumer grade one you could buy.
The problems all strangely appear to point at users being allowed to control their routers. Btw that gaming router vulnerability is not usable by people who aren't physically touching the router.
@@shodanxx home routers have had huge security bugs in them for decades now. new bugs but not new problems. the end users aren't given full control of their router, they only have very limited access. the hackers who get in have more control over the hardware than the person who bought the hardware. I've used pfsense forever and a day. I've even managed pfsense for businesses and servers in datacenters. I have full root access and have never once been compromised.
If it's done from the ISP side, it gets rather easy -if you're on the inside- and has nothing much to do with router security It's about how these things can be updated remotely by an ISP
@@Wannes_ TR-069 protocol. Unencrypted, wide open to the internet for most routers. Very rarely will they be on seperate VLAN's for example or have any sort of real randomized username/pw combination. Most of it is just garbage copy-pasting stuff and available for almost all employees without any real challenging security measures or procedures to prevent abuse. Almost all low wage support keyboard monkeys have access to it in order to reset your router when you call them. It takes only one that is a little bit smarter and more malevolent then the rest to abuse this on a wide scale. I knew a couple former employees who worked at ISP's and it is almost a mess everywhere. It really shows you how the internet *barely* works. Quite scary to think about.
Bob was also the first politician in the country to listen to and stand with the public against the Restriction on the use of Cash bill (Cash ban bill).
They also make Fibre optic head-ends (OLTs), like those an ISP would use to distribute and manage a GPON network. Was news to me but appearently pretty common.
Nokia IS a telecommunications giant. They don’t make many consumer devices anymore. You shouldn’t be surprised if your latest iPhone connects directly to Nokia hardware.
There's one problem with the 'Operation Endgame'. TOR. Many of the cybercriminals use TOR to either use it as a C2, or as a comms method. So, with a perfect OPSEC, it's difficult to find people to disrupt operations just by the info alone. Because the OPSEC is perfect, which in most situations is never the case. So, you'll need some kind of LE backdoor into the TOR client or Linux component to just catch people off guard, but at the same time, this allows LE to just watch what you're doing on TOR or on your computer which defeats the purpose of TOR in the first place. So, the only reliable methods to catch criminals are vulnerable software and OPSEC mistakes. And that's the problem when it comes to this kind of thing. Problem could be is that either the server is a honey pot, or the person that makes the 'OPSEC mistake' is not the person that is making the mistake. And TOR conceals that. There's a lot of problems to deal with, for example proximity issues, bullet-proof hosting, impersonation(where the cybercriminal is impersonating some other group to mislead the investigation), etc.
TOR network is controlled and run by the US government. It is not anonymous. They would use a no log VPN for anonymity. They can figure out which country it is coming from. The FBI and other agencies can track anyone on TOR. The cyber criminals use a colluding government to protect them.
Law enforcement isn't going to backdoor Tor because they use Tor themselves; for them to be anonymous you have to be. That's not to say there's not ways a Tor connection can be deanonymized, there's also ways to prevent those techniques. Nothing's infallible though, both fortunately and unfortunately
there's a reason most of the people who operate with impunity are doing it out of Russia, China, NK, Dubai etc, it's cause pretty much anywhere else if they really wanna find you, they will. everything is reliant on ISP and government compliance
05:45 - You seem to have missed the rather obvious double meaning of "think about your next move" -- They deliberately make the (y) of "your" be both there and not there. it's a double meaning: Think about OUR next move and think about YOUR next move. The clear threat of "if you don't do anything, we will. We're giving you this chance to do the right thing before the hammer comes down"
The only way to update firmware on that many cable modems is to modify the TFTP server internally behind the cable head-ends. This had to be done by somebody inside of the NOC (Network Operations Center). All the modems have a unique MAC address attached to the coax PHY. That MAC address is used to request a BIN file from the TFTP server inside the NOC. This is a standard and it is secure.
That Sagemcom F5380 was such a bulletproof router being deployed by another major ISP in the US. Before they began the phase out process in the late 2010s. But even after that. Technicians would deploy those routers in people’s homes in the 2020’s when the new stuff wasn’t working. Or they ran out of the newer router. Real shame.
The routers might have been a test run to see what happens. Do it in a small town. You see how total the destruction is without making waves, plus you can see if it can be traced to the source.
There's some merit behind having a redundant number of antennae to minimize packet loss, but any scenario where an Ethernet cable is an option will always be 100x better.
Hell yeah! About time someone goes against hackers. I don't know why you sound disappointed hackers can't ruin the lives of everyday ppl. At least SOMEONE is actually trying
I have some theory on the how they bricked a bunch of ISP branded routers. These routers run custom firmware which these days includes a way to receive 'OTA' Firmware updates and remote configuration from the ISP. This is a backdoor for hackers sadly, but could also add to the disgruntled former employee theory. I recall a similar incident with TalkTalk in the UK a few years ago, a teenager some how got access to a bunch of customer's routers and made a big mess. My guess if it's not an employee, poor security at the ISP end that enabled access to a bunch of these devices via a management subnet on the network or a config server.
Cable provider wasn’t property keeping their router fleet maintained. Hope state regulators forced them to credit clients and forced them to update routers.
the routers were probably being actively used to perform ddos attacks. someone got tired of it and bricked the routers so they can no longer be used for ddos attacks.
they almost always do (at least in the US) It's a matter of maintaining control for the companies. They're happy to provide them, even requiring their own at their own expense.
I used to work at a much larger providers NOC. I specialized in both data and transport (SONET). There were some routes we would lease from Windstream. I could call them up and tell them their shit was down before they knew their shit was down. Then I would follow up every fing day demanding escalations, explanations, estimations. The incompetence at Windstream is mind numbing. Implying sabotage is generous. Incompetence is the cause. Level 3 was no better. Call those clowns up... Hey I see all these routes down WTF is going on over there? Oh yeah we had a power outage. Ok... why didn't the generator pick it up? Well it ran out of fuel. Really? How long have you been without power? Little over an hour....
Here in Europe (specifically in Italy) we have a law that forces ISP to gives credentials for authentication to use a 3rd party router,can't imagine happening to myself (other than me messing with it)
Yep probably a disgruntled ex-employee that used the TR-069 remote management protocol (yes, a lot of ISPs have remote access to your router) and pushed some new malicious firmware to a bunch of devices while they still knew the creds on the ISP end, once they found out they were being laid off 🤔
You actually need to thank this hacker destroying your vulnerable equipment. You atleast will get forced to fix your privacy leak. Keep telling you dont have anything to hide.. wait ten years and you will regret if the damage isnt done already.
I mean…. ISP have access to your device at home which is why i dont use it without my own router, and not only that their device isnt any better than my existing device so theres no reason to use it
I think its not outside the realm of possibility that the router hacks were an undisclosed action from the US government. Maybe there were potential vulnerabilities and enough sensitive Windstream customers that justified the action. And if it doesn't come back to them, why not ? People with dead routers going to get new ones, new ones less vulnerable?
Randomly bricking hundreds of thousand routers is such a strong statement towards the ISP that has to replace them. Millions of dollars of damage for those shitty companies.
I just looked up those 3 models listed, two DSL *Modems* with gigabit class speeeds and the sagemcom f5380 is a Fiber ONT gateway. It's almost unheard of for that kind of connectivity in rural areas of the country, I'd bet a lot of high population dencity cities still don't offer that yet, if the company did have recent layoffs it's easy to see why they couldn't afford to keep those workers around. The word router is a bit misleading, but wow is that an unexpected group of targets...
*I wonder why Russia is not "fire-walled" and blocked by the USA and Europe? The FBI already knows the ISP addresses of all the VPN companies so they can easily be blocked too! In fact the best reason not to use a VPN is that those ISP's are KW'd "Keyword Watched" by all government agencies the heaviest (Arousing suspension is usually a criminals first and last mistake.)
editors fs had a laugh making europols videos as a cutter myself I can defenitely see why they used that stock footage I would die laughing making that
Easiest way in: through the ISP So yeah, an inside job by disgruntled employee(s) is a very likely cause If they push a "modified" firmware as an update, it's done
That sounds nasty. It does sound like it should be repairable though, as long as someone takes the time to figure out what it actually did to the insides of it. Generally router and firewall boxes are just SBC's (single board computers) set up to perform specific function. I remember I had a firewall setup on a Linux server we used as a office gateway to the Internet, but various others kept saying we didn't have a firewall. The company CEO then went behind my back and got (very expensive) contractors to install a little firewall box. It made me laugh afterwards, because the firewall appliance they installed contained a little SBC that ran Linux.
They probably werent a specific target for a hate crime or anyone being angry with them, but more rather they probably operate a few DDoS for hire or botnet spots like people whi do qbot abd mirai variants where devices or attacks are sold
Inb4 Americans pointing out I pronounce 'router' the British way 😂
the correct way :D
Hope they fix their rooters 🙏🙏🙏
Nope, I'm early and I can see that the first comment doing so is in fact 4 seconds prior to yours.
I'm British, and I pronounce it 'rauter'
Rooter, lol.
600K routers from a single ISP- yea, it's a disgruntle network employee.
Comcast employees can reset and mess with routers, been done to 42 year old ebegging youtubers... and it was funny. he was going to quit and had fun
Alternately someone who found a vulnerability and decided it was better to 'shut it down' than to leave it open. Personally, I'd rather have my router bricked than compromised. I can diagnose 'it's dead' pretty fast but probably wouldn't notice a compromise for a long time.
yeah, I thought the same thing
Somebody got pissed off it seems.
@@opus3989It is quite a bit more than a bit of a grey hat thing to do
Those poor rooters.
Roto-Rooter or Rctl Rooter 7? 😂
I believe it's spelled "Roo'er".
🚽 “Call Roto-Rooter…. That’s the name….
They’ll FLUSH your TROUBLES down the Drain!”
Damn you people.
I can’t get that damn 1970’s jingle out of my head.
🤣
It's the classy way to say it.
@@Trendy_Bendy_OriginalIt's called a layer 3 network device ☝️🤓
Definitely sounds like a former employee. Windstream is one of the worst places to work.
Was it you ;)
it seems like most ISPs are garbage, not sure why. I cant think of a single ISP that has a good reputation.
@@TurtleMountain all the co-op ones all over different states have good rep, but no multi-state large one does.
@@ivannasha5556 Lol, no. I just remember how they treated everyone, and how many poor decisions they made as a company. Hands down the worst job I've ever had.
Or customer sick of their ISP not updating their clearly venerable routers...
Good guy hacker finds vulnerability and bricks routers, thus saving customers from being hacked.
from what I've seen ISP use default password and remote administration can't be disabled even blocking the port, only by forwarding the port to local port, and telling anyone in the company about this 10+ year old vulnerability is scoffed at, or your told it's not a problem, and they suddenly retire the next month, your emails will go unanswered.
That's what I was thinking. At least he bricked them before someone else did much worse with them. Hopefully the vulnerability is taken seriously and fixed. The cost to replace the routers should make them take it seriously.
Use to be a windstream customer and i can see why a hacker would hate them. Worse isp i ever had
tell us
*more*
Actually, idk if that's a good idea, lol
I used to be a Windstream customer and I agree with you. Overpriced and poor customer service
I often forget routers are just mini computers
Isn't _everything_ just a mini computer these days?
It seems like ya can't even toast bread without one anymore....
@@Stratelierhow could we live if the toaster didn’t connect to the wifi
Here’s a toast to toasters
Yeah it's an arm based computer running a firewall, DHCP server, arp and other such services.
You can just install OPNsense in an old PC and have a better router than any consumer grade one you could buy.
@@johnsmith8981lots of them are also MIPS based, not just arm
It’s scary how bad these routers are at security.
The problems all strangely appear to point at users being allowed to control their routers. Btw that gaming router vulnerability is not usable by people who aren't physically touching the router.
@shodanxx and remember you don't even have full access over the router in some things lol
@@shodanxx home routers have had huge security bugs in them for decades now. new bugs but not new problems. the end users aren't given full control of their router, they only have very limited access. the hackers who get in have more control over the hardware than the person who bought the hardware. I've used pfsense forever and a day. I've even managed pfsense for businesses and servers in datacenters. I have full root access and have never once been compromised.
If it's done from the ISP side, it gets rather easy -if you're on the inside- and has nothing much to do with router security
It's about how these things can be updated remotely by an ISP
@@Wannes_ TR-069 protocol. Unencrypted, wide open to the internet for most routers. Very rarely will they be on seperate VLAN's for example or have any sort of real randomized username/pw combination.
Most of it is just garbage copy-pasting stuff and available for almost all employees without any real challenging security measures or procedures to prevent abuse.
Almost all low wage support keyboard monkeys have access to it in order to reset your router when you call them. It takes only one that is a little bit smarter and more malevolent then the rest to abuse this on a wide scale.
I knew a couple former employees who worked at ISP's and it is almost a mess everywhere. It really shows you how the internet *barely* works. Quite scary to think about.
And yet 99% of ISPs are absolute assholes when I tell them I want to build and manage my own router.
zen internet let me do this in the uk with no issues :)
i mean u could bridge it or at very least DMZ it not ideal but this is as far as you'll get
This video makes me very happy I run Opnsense on an old thin client, instead of any commercial consumer router.
NGL, the designer for the europol op did nice work
Bob was also the first politician in the country to listen to and stand with the public against the Restriction on the use of Cash bill (Cash ban bill).
As a windstream customer, I wasnt affected, but they gave me a Nokia router (WHO GENUINELY KNEW NOKIA MADE ROUTERS) but uhh yeah
I genuinely knew. We used to run our Checkpoint firewalls on Nokia hardware. ffs I'm old 😂
Havent seen a nokia since pre iPhones, and most people had the palm size nokia cellphone in 2g days
I imagine the advertising for those routers must be something like: "Firewalls so indestructible, they'll brick computers that try."
They also make Fibre optic head-ends (OLTs), like those an ISP would use to distribute and manage a GPON network. Was news to me but appearently pretty common.
Nokia IS a telecommunications giant. They don’t make many consumer devices anymore. You shouldn’t be surprised if your latest iPhone connects directly to Nokia hardware.
Am i the only one thinking that the Europol video is one of those TTS ticktocks that just spam content?
There's one problem with the 'Operation Endgame'.
TOR.
Many of the cybercriminals use TOR to either use it as a C2, or as a comms method. So, with a perfect OPSEC, it's difficult to find people to disrupt operations just by the info alone. Because the OPSEC is perfect, which in most situations is never the case.
So, you'll need some kind of LE backdoor into the TOR client or Linux component to just catch people off guard, but at the same time, this allows LE to just watch what you're doing on TOR or on your computer which defeats the purpose of TOR in the first place.
So, the only reliable methods to catch criminals are vulnerable software and OPSEC mistakes.
And that's the problem when it comes to this kind of thing. Problem could be is that either the server is a honey pot, or the person that makes the 'OPSEC mistake' is not the person that is making the mistake. And TOR conceals that.
There's a lot of problems to deal with, for example proximity issues, bullet-proof hosting, impersonation(where the cybercriminal is impersonating some other group to mislead the investigation), etc.
isn't it just a matter of time until they use I2P? why don't they already?
@@squirlmyif you try to deploy an I2P, things like connecting to a webpage can take half a day.
TOR network is controlled and run by the US government. It is not anonymous. They would use a no log VPN for anonymity. They can figure out which country it is coming from. The FBI and other agencies can track anyone on TOR. The cyber criminals use a colluding government to protect them.
Law enforcement isn't going to backdoor Tor because they use Tor themselves; for them to be anonymous you have to be. That's not to say there's not ways a Tor connection can be deanonymized, there's also ways to prevent those techniques. Nothing's infallible though, both fortunately and unfortunately
there's a reason most of the people who operate with impunity are doing it out of Russia, China, NK, Dubai etc, it's cause pretty much anywhere else if they really wanna find you, they will. everything is reliant on ISP and government compliance
05:45 - You seem to have missed the rather obvious double meaning of "think about your next move" -- They deliberately make the (y) of "your" be both there and not there. it's a double meaning: Think about OUR next move and think about YOUR next move. The clear threat of "if you don't do anything, we will. We're giving you this chance to do the right thing before the hammer comes down"
also, together with the reach out, is any one of your colleagues in touch with the FBI? do you want to get a payday from them? is it worth the risk?
@@schwingedeshaehers Those are the wrong questions to ask, IMHO.
Oh very interesting, Thanks fed :)
The only way to update firmware on that many cable modems is to modify the TFTP server internally behind the cable head-ends. This had to be done by somebody inside of the NOC (Network Operations Center). All the modems have a unique MAC address attached to the coax PHY. That MAC address is used to request a BIN file from the TFTP server inside the NOC. This is a standard and it is secure.
Canada has been using that exact model for over 15 years so I would 100% expect alot of Canadian ISPS to be oblivious to this as well
I love monopolies that do the bare minimum because they don't need to compete with things like "good security" and "prices"!!!
My internet went out this morning actually, router has a blinking “FAIL” red light
That Sagemcom F5380 was such a bulletproof router being deployed by another major ISP in the US. Before they began the phase out process in the late 2010s. But even after that. Technicians would deploy those routers in people’s homes in the 2020’s when the new stuff wasn’t working. Or they ran out of the newer router. Real shame.
Ive brick many a device in my days... but this unknown got me beat.
Did you bend them too?
@onegurd4598 like Lenny from " of Mice and Men"?
Yes, More or less.
1:00 "dead rooters" 😂
Now they’re properly rooted
Rooter! I haven’t heard someone say that in years lol
The routers might have been a test run to see what happens. Do it in a small town. You see how total the destruction is without making waves, plus you can see if it can be traced to the source.
Bro knew I just sat down for dinner.
I left the moment you said "rooter"
2$ CAT7 cable > 200+$ gaming wifi brick
Not always possible, sadly.
True in terms of performance, but irrelevant in terms of RCE vulnerabilities from the WAN port...
Hey the problem isn't the "gaming" part, it's the "tplink" part. Worst company to buy a router from in terms of security, quality, updates, etc.
And how will you get internet into that Cat7 (usually fake) cable? A router.
A "gaming" router? Now I've heard everything. Some people really will waste their money on anything.
asus has made them for like 8 years now bud
Marketing lies
Reminds me of that meme "Who would win? A 200$ gaming router or a 15$ cable"
There's some merit behind having a redundant number of antennae to minimize packet loss, but any scenario where an Ethernet cable is an option will always be 100x better.
We'll see who's laughing when I get hemorrhoids from my $400 gaming chair
The ISP mainly have farmers as customers who use the IOT to control everything now
Hell yeah! About time someone goes against hackers. I don't know why you sound disappointed hackers can't ruin the lives of everyday ppl. At least SOMEONE is actually trying
How do I buy a season pass for Operation Endgame?
I have some theory on the how they bricked a bunch of ISP branded routers. These routers run custom firmware which these days includes a way to receive 'OTA' Firmware updates and remote configuration from the ISP. This is a backdoor for hackers sadly, but could also add to the disgruntled former employee theory. I recall a similar incident with TalkTalk in the UK a few years ago, a teenager some how got access to a bunch of customer's routers and made a big mess. My guess if it's not an employee, poor security at the ISP end that enabled access to a bunch of these devices via a management subnet on the network or a config server.
Cable provider wasn’t property keeping their router fleet maintained. Hope state regulators forced them to credit clients and forced them to update routers.
Just a wild guess. Many people are just not motivated or knowledgeable enough to change the default admin password on their routers.
Gaming router?? Can it run Doom?😀
It has a quad core CPU and 16GB of storage apparently, so probably!
You bet! I mean, people have run GTA San Andreas on (non-gaming!) routers before
It has a quadcore cpu and some flash and runs linux so its 100 percent possible
that sound effect at 6:09-6:10 is terrifying to SS13 players holy. the feds probably scared me more than they did their intended target
Maybe europol should spend more time investigating and prosecuting then hyping up their operations like it was some ad campaign
Ooph! If the archer C5400x is considered old.... some of the networking hardware I have online must be downright ancient!
Lol i remember when bricker bot was a thing, just a qbot that went aroound bricking devices.
FBI trolling hackers is the least wasted tax payer money I have seen. It makes me laugh, so worth it :P
the routers were probably being actively used to perform ddos attacks. someone got tired of it and bricked the routers so they can no longer be used for ddos attacks.
bro was doing a bit of trolling with the routers
The company better offer replacements or refunds for the routers, If I was affected and my ISP didn't give a replacement or refund I would RAGE
they almost always do (at least in the US) It's a matter of maintaining control for the companies. They're happy to provide them, even requiring their own at their own expense.
Season 2: this is Even. Do you know even? Where is even right now? Does even work with odd? I can't even
I used to work at a much larger providers NOC. I specialized in both data and transport (SONET). There were some routes we would lease from Windstream. I could call them up and tell them their shit was down before they knew their shit was down. Then I would follow up every fing day demanding escalations, explanations, estimations. The incompetence at Windstream is mind numbing. Implying sabotage is generous. Incompetence is the cause.
Level 3 was no better. Call those clowns up... Hey I see all these routes down WTF is going on over there? Oh yeah we had a power outage. Ok... why didn't the generator pick it up? Well it ran out of fuel. Really? How long have you been without power? Little over an hour....
Windstream was bankrupt for a few years there.
Here in Europe (specifically in Italy) we have a law that forces ISP to gives credentials for authentication to use a 3rd party router,can't imagine happening to myself (other than me messing with it)
Ah yes, the final brick on my list, they beat me it. Fine, I'll speed run the bricking of the newest device that comes to the market.
Still better than the actual Endgame movie
the endgame thing could be soft recruitment for potential double agents
really very little "soft" about it. It's about as close to plain recruitment without declaring "We are recruiters looking for l33t h4ckers!"
Yep probably a disgruntled ex-employee that used the TR-069 remote management protocol (yes, a lot of ISPs have remote access to your router) and pushed some new malicious firmware to a bunch of devices while they still knew the creds on the ISP end, once they found out they were being laid off 🤔
Rache Bartmoss would approve
If no one is claiming credit, then it's either a single person, such as a disgruntled, former employee, or it's a state actor.
You actually need to thank this hacker destroying your vulnerable equipment. You atleast will get forced to fix your privacy leak. Keep telling you dont have anything to hide.. wait ten years and you will regret if the damage isnt done already.
I mean…. ISP have access to your device at home which is why i dont use it without my own router, and not only that their device isnt any better than my existing device so theres no reason to use it
8:11 I don't know why but that ";" really made laugh harder than it should've 😂
I think its not outside the realm of possibility that the router hacks were an undisclosed action from the US government. Maybe there were potential vulnerabilities and enough sensitive Windstream customers that justified the action. And if it doesn't come back to them, why not ? People with dead routers going to get new ones, new ones less vulnerable?
They should hand over all firmware code to the police for an investigation. They could be infiltrated by criminals who want to exploit the company.
3:09 Since Andrew Tate, now everyone is into Chess.
Even Europol? ;)
#FreeTopG
If the router hack was by a former ISP employee, it may have something to do with TR69.
Seems like a perfect setup for starlink to not get paid for the work that was put in, for rural internet across the US. Just a thought.
Maybe some customers who had bad experience with isp service.
my wifi also went offline a few days ago. i assume this is why. my router isn’t bricked thankfully
It was employee. Poor rooters
No coverage of the ShinyHunters Santander breach...
Well hopefully when those customers get new modems they will be new models that are patched for the exploit.
Who had to suck up the loss of 600K routers? the ISP or the individual clients?
I wonder why they were bricked outright, usually exploits have a purpose
Payback is supposed to be a bitch.. just sayin'
I think the operation endgame stuff is funny 🙂
bro said rOOOOOOOOter
sad day for those rooters! 😭
They should make 100 episodes where they lost, but I guess we have a certain podcast for that
Might want to make sure the Sream doesn't have anything to gain by doing it to themselves.
All oh the sudden someone else is to blame for their poor service
Randomly bricking hundreds of thousand routers is such a strong statement towards the ISP that has to replace them. Millions of dollars of damage for those shitty companies.
I just looked up those 3 models listed, two DSL *Modems* with gigabit class speeeds and the sagemcom f5380 is a Fiber ONT gateway. It's almost unheard of for that kind of connectivity in rural areas of the country, I'd bet a lot of high population dencity cities still don't offer that yet, if the company did have recent layoffs it's easy to see why they couldn't afford to keep those workers around. The word router is a bit misleading, but wow is that an unexpected group of targets...
Does anyone know if the C5400X is the same router as the AX11000? They look the same
The public back and forth is for the public to see and believe their safety is being secured lol.
*I wonder why Russia is not "fire-walled" and blocked by the USA and Europe? The FBI already knows the ISP addresses of all the VPN companies so they can easily be blocked too! In fact the best reason not to use a VPN is that those ISP's are KW'd "Keyword Watched" by all government agencies the heaviest (Arousing suspension is usually a criminals first and last mistake.)
From Routers to Nueters.
I believe the hacker tried to backdoor these routers and accidentally bricked them in the process
nope. would have been a lot less efficient in that case. It's not at all difficult to avoid bricking if that's not what you want.
basically all routers “Made in China” have back door and can be hacked.
good. buy fritzbox next time 👌
editors fs had a laugh making europols videos as a cutter myself I can defenitely see why they used that stock footage I would die laughing making that
what a mad rooter
I called many plumbers near me to fix my rooter problem... they can't fix it.
Plot twist: it was a disgruntled windstream customer XD
Its everywhere 🌊💧
your the best man! i hate reading and your content does it for me 🔥🔥
dang those Roooooooter... Best hacking news account!
Bricking them is just senseless vandalism! 🙄
Would you rather it be bricked, or loaded up with spyware, watching your every action?
Depends. Considering this is 2013, the ISP-supplied routers back then were practically a violation of the Geneva convention
@@JohnFink-p5l as if it isn’t already lmao
@@JohnFink-p5l US household routers are terrible, and as it is now, ISPs can watch your every action. That is default state of security
@@JohnFink-p5l The governments and big tech companies have already beaten the hackers to that point.
Crime gang that shorts isp stock before bricking all the routers
Easiest way in: through the ISP
So yeah, an inside job by disgruntled employee(s) is a very likely cause
If they push a "modified" firmware as an update, it's done
That sounds nasty. It does sound like it should be repairable though, as long as someone takes the time to figure out what it actually did to the insides of it.
Generally router and firewall boxes are just SBC's (single board computers) set up to perform specific function. I remember I had a firewall setup on a Linux server we used as a office gateway to the Internet, but various others kept saying we didn't have a firewall. The company CEO then went behind my back and got (very expensive) contractors to install a little firewall box. It made me laugh afterwards, because the firewall appliance they installed contained a little SBC that ran Linux.
man, i miss when malware was made to just cause an inconvenience or to troll people, rather than for monetary gain
6:07 - sounds like they used a kurzgesagt ai voice clone
How much money to replace all infected devices?
$6 worth
My guess... someone wanted to tinker and they succeeded and then some
6:40 well that was super cringe lol
They probably werent a specific target for a hate crime or anyone being angry with them, but more rather they probably operate a few DDoS for hire or botnet spots like people whi do qbot abd mirai variants where devices or attacks are sold
At least Iranian servers are safe from raids.
Wait a minute
Are they?
This happened 8 months ago, why is it news today?
ISP pissed off the wrong guy by making it too hard to cancel account.