German telecoms giant Deutsche Telekom has rolled out a software update to customers after nearly a million were either cut off or had issues with their broadband service and has refused to rule out the possibility the problems were caused by a cyberattack.
Customers have reported issues with their service since yesterday afternoon and engineers had been working on a fix which is now available.
The faults have not been localised to a single part of the network and have impacted users across the country. As many as 900,000 of the firm’s 20 million broadband customers were affected, it has been confirmed.
The absence of an error pattern has led to speculation an external actor has caused the fault.
“The vast majority of our customers can use our services without restrictions and our network is fully operational,” said a spokesperson. “However, since yesterday afternoon, a significant number of customers have been having problems: around 900,000 customers with specific routers from around 20 million fixed network customers.
“Based on the error pattern, we cannot exclude the possibility that the routers have been targeted by external parties with the result that they can no longer register on the network.
“Currently a software update is provided to all affected customers to fix the router problem. The software rollout already started and we can see the success of this measure.
“Customers should unplug their router for 30 seconds. Afterwards when reactivating the router the new software will be installed automatically from the servers.”
Experts have suggested cybercriminals looking to stage massive Distributed Denial of Service (DDoS) could be responsible.
“The attack of this kind isn’t something new: this year we had multiple reports about thousands of infected routers used for DDoS botnets,” said Alex Mathews, EMEA technical manager at Positive Technologies.
“We would even suspect that this German story is about ‘a broken botnet’. After all, hackers are not very interested in broken routers, they prefer to take control over working routers, and use them for other attacks. Perhaps, someone tried to build a Mirai-like botnet out of these infected routers in Germany but something went wrong and routers just went off.
“Whether this attack could have been prevented depends on what type of vulnerability was used to infect the routers. For example, Mirai botnet code wasn’t too serious: the malware was looking for gadgets with well-known default passwords (admin: admin, root: password, and so on).
“If people had just changed these default passwords, their routers wouldn’t have been infected. On the other hand, the malware authors can use more serious, unknown vulnerability in routers’ firmware or in communication protocols. In this case, users hardly can do anything to protect themselves.”
Are you a security pro? Try our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…
View Comments
“If people had just changed these default passwords, their routers wouldn’t have been infected."
Only a fool would blame the end-user. It's the carrier's responsibility to ship router firmware with unique passwords. Why not just use the router's MAC address as the admin password?