Clara Armengou, DOAJ Project and Communications Manager, reports on 8/12/2018 on Liblicense that:
After much investigation and active measures, we can state that the DOAJ is effectively under attack from an unknown third party.
We have deployed a number of counter-measures to halt this attack, but with limited success, and are therefore forced to take even more extreme measures to attempt to mitigate this. We hope that this will work but we cannot predict the outcome at this stage.
The Cisco Talos Intelligence Group has released "New VPNFilter Malware Targets at Least 500K Networking Devices Worldwide."
Here's an excerpt:
Working with our partners, we estimate the number of infected devices to be at least 500,000 in at least 54 countries. The known devices affected by VPNFilter are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office (SOHO) space, as well at QNAP network-attached storage (NAS) devices. No other vendors, including Cisco, have been observed as infected by VPNFilter, but our research continues. The behavior of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols. Lastly, the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.