The attacks exploit weaknesses found in routers made by Zyxel, Speedport, and possibly other manufacturers. Devices that use default or otherwise weak authentication passwords can be remotely commandeered and made to join botnets that carry out Internet-crippling denial-of-service attacks. The attacks started shortly after researchers published attack code that exploited the exposed TR-064 service. SANS Internet Storm Center: Honeypot servers posing as vulnerable routers are receiving exploits every five to 10 minutes. Deutsche Telekom: 900,000 customers are vulnerable until they are rebooted and receive an emergency patch.”]

