‘Ballista’ Botnet Exploits 2023 Vulnerability in TP-Link Routers

TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine.——————————————————-Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities. [Black Hat News](/program/black-hat)[Omdia Cybersecurity](/program/omdia-cybersecurity)[Advertise](https://reg.darkreading.com/media-kit?kcode=drsitehd) ![Dark Reading Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&auto=webp&quality=80&disable=upscale ‘Dark Reading Logo’) [Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) [](https://twitter.com/DarkReading)[](https://www.linkedin.com/company/dark-reading/)[](https://www.facebook.com/darkreadingcom/)[](https://www.youtube.com/@DarkReadingOfficialYT)[](https://www.darkreading.com/rss.xml)[](https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US)[Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) Cybersecurity Topics #### Related Topics* [Application Security](/application-security)* [Cybersecurity Careers](/cybersecurity-operations/cybersecurity-careers)* [Cloud Security](/cloud-security)* [Cyber Risk](/cyber-risk)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cybersecurity Analytics](/cybersecurity-analytics)* [Cybersecurity Operations](/cybersecurity-operations)* [Data Privacy](/cyber-risk/data-privacy)* [Endpoint Security](/endpoint-security)* [ICS/OT Security](/ics-ot-security)* [Identity -& Access Mgmt Security](/cybersecurity-operations/identity-access-management-security)* [Insider Threats](/vulnerabilities-threats/insider-threats)* [IoT](/ics-ot-security/iot)* [Mobile Security](/endpoint-security/mobile-security)* [Perimeter](/cybersecurity-operations/perimeter)* [Physical Security](/cybersecurity-operations/physical-security)* [Remote Workforce](/endpoint-security/remote-workforce)* [Threat Intelligence](/threat-intelligence)* [Vulnerabilities -& Threats](/vulnerabilities-threats) #### Recent in Cybersecurity Topics[Keyboard with blue key showing update![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7c22ce4a66d7bfa9/67d09ca51ec1c73e402d3382/update_Sashkin_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)](/application-security/whopping-number-microsoft-zero-days-under-attack)[Application Security](/application-security) [Whopping Number of Microsoft Zero-Days Under Attack](/application-security/whopping-number-microsoft-zero-days-under-attack)[Whopping Number of Microsoft Zero-Days Under Attack](/application-security/whopping-number-microsoft-zero-days-under-attack) by[Jai Vijayan, Contributing Writer](/author/jai-vijayan) Mar 11, 2025 5 Min Read [President Donald Trump signs the CISA Act during a ceremony in the Oval Office in 2018 in Washington, DC![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99641cb19b27fd21/67d090b630e76f3c8618905a/trump1800_White_House_Photo_alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cybersecurity-operations/trump-sean-plankey-cisa-director)[Cybersecurity Operations](/cybersecurity-operations) [Trump Taps Sean Plankey to Fill Empty CISA Director Chair](/cybersecurity-operations/trump-sean-plankey-cisa-director)[Trump Taps Sean Plankey to Fill Empty CISA Director Chair](/cybersecurity-operations/trump-sean-plankey-cisa-director) by[Kristina Beek, Associate Editor, Dark Reading](/author/kristinabeek) Mar 11, 2025 1 Min Read World #### Related Topics* [DR Global](/program/dr-global)* [Middle East -& Africa](/keyword/middle-east-africa)* [Asia Pacific](/keyword/asia-pacific) #### Recent in [World](/program/dr-global)[See All](/program/dr-global) [A still from the TV show Dexter![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta1bc738d33edf406/67cf380a93ecd987ae01f81d/Dexter-Photo_12-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [‘Desert Dexter’ Hot Button Facebook Ads Tag Mideast Victims](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims)[‘Desert Dexter’ Hot Button Facebook Ads Tag Mideast Victims](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims) by[Nate Nelson, Contributing Writer](/author/nate-nelson) Mar 11, 2025 3 Min Read [A map of ransomware attacks in Middle East![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt176d0573ae49bb46/67c8b62f7c1fdadfdedb1936/map-of-ransomware-attacks-ransomware_live.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [Ransomware Attacks Build Against Saudi Construction Firms](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms)[Ransomware Attacks Build Against Saudi Construction Firms](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms) by[Robert Lemos, Contributing Writer](/author/robert-lemos) Mar 6, 2025 4 Min Read [The Edge](/program/the-edge) [DR Technology](/program/dr-technology) Events #### Related Topics* [Upcoming Events](/events)* [Podcasts](/podcasts)* [Webinars](/resources?types=Webinar) [SEE ALL](/events) Resources #### Related Topics* [Library](/resources)* [Newsletters](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)* [Podcasts](/podcasts)* [Reports](/resources?types=Report)* [Videos](/videos)* [Webinars](/resources?types=Webinar)* [Whitepapers](/resources?types=Whitepaper)* [](/ )* [](/ )* [](/ )* [](/ )* [Partner Perspectives](/keyword/partner-perspectives) #### Recent in [Resources](/resources)[SEE ALL](/resources) [cybersecurity meeting concept![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5c68ce2cd5715df5/66552a4009eeb9bc2bffa3a4/meeting-Prostock-studio-AlamyStockPhoto.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider)[Cybersecurity Operations](/cybersecurity-operations) [4 Security Questions to Ask Your Enterprise Generative AI Provider](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider)[4 Security Questions to Ask Your Enterprise Generative AI Provider](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider) May 30, 2024 3 Min Read [Generative AI word cloud![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07309b91c116606b/65ca5364c31fbf040a5a0761/GenAI_MauriceNorbert_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips)[Vulnerabilities -& Threats](/vulnerabilities-threats) [Looking to Leverage Generative AI? Prep for Success With These 4 Tips](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips)[Looking to Leverage Generative AI? Prep for Success With These 4 Tips](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips) by[Microsoft Security](/author/microsoft-security) May 28, 2024 3 Min Read 404 Error=========Going the wrong way?Sorry. The page you requested cannot be found. [Back to home page](/) ![Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&auto=webp&quality=80&disable=upscale ‘Logo’) ##### Discover More[Black Hat](/program/black-hat)[Omdia](/program/omdia-cybersecurity) ##### Working With Us[About Us](/about-us)[Advertise](/advertise)[Reprints](https://info.wrightsmedia.com/informa-licensing-reprints-request) ##### Join Us[Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) ##### Follow Us[](https://twitter.com/DarkReading)[](https://www.linkedin.com/company/dark-reading/)[](https://www.facebook.com/darkreadingcom/)[](https://www.youtube.com/@DarkReadingOfficialYT)[](https://www.darkreading.com/rss.xml)[](https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US) ![Informa](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb3f56b75133715aa/674ee1ace1b5ac19f79ca74e/Informa_Logo_OneLine_Graduated_White_RGB.png?width=700&auto=webp&quality=80&disable=upscale ‘Informa’) Copyright © 2025. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. [Home-|](https://www.informatech.com/)[Cookie Policy-|](/cookie-policy)[Privacy-|](https://www.techtarget.com/privacy-policy/)[Terms of Use](https://www.informatech.com/terms-and-conditions/)

Related Tags:
NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 335 – Electrical Equipment

Appliance

Component Manufacturing

NAICS: 334 – Computer And Electronic Product Manufacturing

NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 33 – Manufacturing – Metal

Electronics And Other

Associated Indicators: