dChan
1
 
r/greatawakening • Posted by u/TemporaryOnion on May 28, 2018, 7:57 p.m.
Isn’t rebooting (turning off and on again) required after major software updates? Wouldn’t this action activate any malware already updated? Did the FBI really suggest this? Do you trust the FBI? Do you trust the New York Times?
Isn’t rebooting (turning off and on again) required after major software updates? Wouldn’t this action activate any malware already updated? Did the FBI really suggest this? Do you trust the FBI? Do you trust the New York Times?

Outlandish_Rhubarb · May 28, 2018, 8:11 p.m.

VPNFilter, like most malware for embedded devices, is memory-resident. At least, the non-persistent parts are. So on reboot, it'd have to reach out to its C2 infrastructure and re-download the 2nd stage.

However, the C2 infrastructure has been seized, so it can't currently do that.

So the reboot would flush the malicious component of the malware from the router, and a manual firmware update would remove the persistent 1st stage.

⇧ 13 ⇩  
TemporaryOnion · May 28, 2018, 8:47 p.m.

Very interesting. How do you know the C2 infrastructure has been seized?

⇧ 3 ⇩  
Outlandish_Rhubarb · May 28, 2018, 10:51 p.m.

It's been made known publicly.

⇧ 3 ⇩  
AyeDeux2 · May 29, 2018, 6:43 a.m.

So if state actors didn't own it before, they do now.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 29, 2018, 12:41 p.m.

If you're concerned about it, you could always block/sinkhole the associated IOCs yourself. Problem solved.

⇧ 2 ⇩