OpenWRT forum suffers data breach

Hackers have compromised the personal information of up to 27,000 users

Hackers have infiltrated the popular open source OpenWRT forum and have made off with personal information and statistical details about the platform’s users.

An administrator account on OpenWRT was violated as part of the cyber attack, although forum moderators don’t yet know how the account was accessed, according to a notice published this weekend. 

This forum serves as a platform for users enthusiastic about the open-source Linux-based router operating system OpenWRT to discuss software development as well as projects, among other subjects. The software itself is primarily used on embedded devices to route network traffic.

According to site statistics, there are roughly 27,000 users registered with the forum and roughly 4,100 active users within the last 30 days. 

The compromised administrative account had a “good password”, but two-factor authentication (2FA), designed to add an additional layer of security to protect against brute force attacks, wasn’t enabled.

“The intruder was able to download a copy of the user list that contains email addresses, handles, and other statistical information about the users of the forum,” OpenWRT moderators said in the notice. 

Related Resource

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Email security threats of 2020 - whitepaper from DarktraceDownload now

“Although we do not believe the intruder could download the database, from an abundance of caution, we are following the advice of the Discourse community and have reset all passwords on the Forum, and flushed any API keys.”

Moderators have urged users to manually reset their passwords as a result of the hack and to brace themselves for phishing attacks, given their email addresses have been compromised. Users with GitHub logins or OAuth keys should also reset or refresh these.

The OpenWRT forum has also urged users to reset passwords by manually entering a link into a web browser, as opposed to clicking any links. This is because the hackers may yet attempt to further lure users by sending fake password reset emails.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
FBI shuts down web shells in hacked Exchange servers
cyber security

FBI shuts down web shells in hacked Exchange servers

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021