More stories

  • in

    REvil ransomware operators claim group is ending activity again, victim leak blog now offline

    Cybercriminals claiming to be part of the REvil ransomware group have alleged that the gang is closing shop after the group lost control of vital infrastructure and had internal disputes. Recorded Future security expert Dmitry Smilyanets shared multiple messages on Twitter from ‘0_neday’ — a known REvil operator — discussing what happened on the cybercriminal forum XSS. He claimed someone took control of the group’s Tor payment portal and data leak website.In the messages, 0_neday explains that he and “Unknown” — a leading representative of the group — were the only two members of the gang who had REvil’s domain keys. “Unknown” disappeared in July, leaving the other members of the group to assume he died. The group resumed operations in September but this weekend, 0_neday wrote that the REvil domain had been accessed using the keys of “Unknown.” In another message, 0_neday said, “The server was compromised and they were looking for me. To be precise, they deleted the path to my hidden service in the torrc file and raised their own so that I would go there. I checked on others — this was not. Good luck everyone, I’m off.”
    Dmitry Smilyanets
    REvil originally closed shop in July after the devastating attack on Kaseya infected hundreds of organizations across the world and caused untold damage. The group is one of the most prolific ransomware gangs currently operating, attacking hundreds of vital companies and organizations over the last few years. But the group attracted immense law enforcement scrutiny following the July 4 attack on Kaseya and ended its operation on July 13. By September, the group returned, continuing to attack dozens of companies in the last few weeks. According to The Record, the July 13 shut down happened because “Unknown” allegedly stole the group’s money and shut down their servers, making it difficult for those remaining to pay affiliates. 

    Smilyanets told the news outlet that he hoped the group had shut down because of law enforcement actions by US officials. The FBI and other US agencies faced significant backlash over the past few weeks because of their actions during the REvil attack on Kaseya. The FBI admitted it had decryption keys that could have helped the nearly 1,500 ransomware victims affected by the Kaseya attack, but decided against it because they were preparing an operation to disrupt REvil’s infrastructure. The group closed shop before the operation could be seen through and the FBI has been harshly criticized by the organizations affected and lawmakers for waiting to hand out the decryption keys. Bitdefender later released a free decryptor for all of the organizations affected by the Kaseya attack. Opinions on the situation were mixed among experts, with some cautioning people not to believe the word of criminals. Others said the situation made sense because REvil was facing criticism from its own affiliates for their actions. Allan Liska, a ransomware expert with Recorded Future, told ZDNet that there were two theories in his mind.”Unknown (the former leader of REvil) ‘returned from the dead’ and was not happy that his software developers were trying to push his ransomware. The second is that a government agency managed to penetrate the server before they closed shop the first time, got Unknown’s private key and decided to take these new actors down,” Liska said. “Normally, I am pretty dismissive of ‘law enforcement’ conspiracy theories, but given that law enforcement was able to pull the keys from Kaseya attack, it is a real possibility. The relaunch of REvil was ill conceived from the start. Rebranding happens a lot in ransomware after a shutdown. But no one brings old infrastructure that was literally being targeted by every law enforcement operation not named Russia in the world back online. That is just dumb.”Liska said that while some may question whether the drama within the group is real, he believes it is legitimate, noting the internal controversy that has engulfed other ransomware groups this year.”There is a lot of money in ransomware right now, and with lots of money is going to come drama,” he said. But while the REvil operators may have shut down this specific group, Liska said there is no doubt that everyone who was part of the REvil organization will continue to conduct ransomware attacks. “Whether it is through creating a new ransomware or becoming an affiliate for another ransomware group, it is hard to give up the money that can be made from ransomware,” Liska said. Sean Nikkel, Digital Shadows senior cyber threat intel analyst, said REvil was already facing additional scrutiny from the broader cybercriminal community due to drama involving accusations of failing to pay those involved in its partnership program and claims that it effectively cut out affiliates and shared decryption keys with victims.  On XSS, Nikkel said 0_neday was asked about who would work with REvil after this latest series of problems, and the representative replied, “Judging by everything, I’ll be working on my own.””Reaction to the news from other forum members ranged from largely unsympathetic to bordering on conspiracy theory. The main area of debate was whether the group would rebrand for a third time, with many questioning whether the cybercriminal community would still trust REvil-related schemes,” Nikkel explained.  Nikkel added that opinions appeared split on whether REvil’s reputation would ensure the group’s continued success, with many pointing out that all publicity is good publicity, and predicting that the promise of profits would still entice affiliates to work with the group in the future. “One theory doing the rounds posited that a disgruntled former team member, combined with poor password hygiene, could have resulted in the attack,” Nikkel added, noting that many users questioned the fact that this topic was even being discussed on the site at all considering XSS’s May 2021 ban on ransomware-related content. “The XSS representative for the LockBit ransomware group claimed to have predicted this turn of events, providing links to their ‘prophetic’ forum posts. They questioned the REvil representative’s intention to leave the forum, opining ‘if the domains have been hijacked, this is 100% proof that someone had a root on the server, which means that your database has been leaked too.’ The LockBit representative even put forward the idea the new REvil forum account may in fact be operated by law enforcement,” Nikkel said. Nikkel noted that in his opinion, the tone of the REvil’s forum posts indicate the group will be back in some form. But they may face difficulty returning after advertising for affiliates on a 90/10 profit-splitting basis, which is more than the group has shared in previous years. “Despite this, and the many controversies that REvil has been involved in that could have eroded all trust in and willingness to cooperate with the group, it seems that the group’s infamy and the promise of high profits are simply too much of a lure for many cybercriminals, who have returned to work with the group time and time again,” Nikkel said. Senior security researcher for DomainTools Chad Anderson added that his team discovered that REvil had a backdoor in its RaaS offering. After that, multiple affiliates of the REvil program confirmed they had been ripped off by the creators. “It’s hard to say what’s real at this point. We’ve seen groups disappear only to be reborn as a more full featured affiliate program. We’ve seen groups of affiliates shift to better payment models and we’ve seen group sites be taken over by others and their source code leaked or re-used,” Anderson told ZDNet. “At this point evidence suggests that the private keys for the Onion hidden services backing the REvil payment infrastructure have been compromised. This certainly could be a government agency operation but it’s just as likely without hard confirmation that it’s some other ransomware group. REvil made a lot of affiliates mad when it turned out their code had a backdoor that could let REvil operators steal from their affiliates.”Emsisoft ransomware expert Brett Callow was skeptical of what was written in the cybercrime forum, noting that they double as press release services for ransomware gangs.”Threat actors know that law enforcement, researchers and reporters monitor forums, and so use them to issue statements. They say only what they want people to know and believe,” Callow said. “Whether REvil has really closed shop, or are scamming their affiliates, or have some other reason for going dark, is impossible to say.” More

  • in

    Brazilian capital surpasses Rio and São Paulo in mobile broadband speed

    Brazil’s capital Brasília surpassed major urban centers of Rio de Janeiro and São Paulo in mobile broadband speed, according to a new report. According to the research on mobile performance by mobile and broadband network intelligence firm Ookla based on data from Internet access performance metrics tool Speedtest, Brasília’s median mobile download speed reached 31.44 Mbps, the fastest among the country’s most populous cities during the third quarter of 2021.After Brasília, Curitiba had the second fastest mobile download speed at an average of 29.35 Mbps, followed by Rio de Janeiro at 25.14 Mbps and São Paulo with 25.08 Mbps. The slowest median speeds were found in Recife, in the northeast of the country, at 18.65 Mbps and Manaus, at the bottom of the list with 18.37 Mbps. Regarding the consistency of each operator’s performance in the country, the report has found that Claro was the fastest mobile operator among top providers in Brazil in Q3 2021; in terms of consistency, 88.2% of results showed at least a 5 Mbps minimum download speed for Claro, and a 1 Mbps minimum upload speed. According to the Ookla report, there was no statistically fastest provider for median 5G download speed, though Claro showed 65.92 Mbps, Vivo 64.61 Mbps and TIM 58.14 Mbps.In terms of the median latency for top mobile providers in Brazil during the third quarter of the year, TIM had the lowest latency at 26 ms, according to the report. When it comes to device information, Ookla’s analysis on some of the fastest phones in Brazil found the iPhone 12 5G delivered the fastest median download speed during in the with 53.28 Mbps. A separate study, published by the Brazilian Internet Steering Committee in August has found that Brazil’s connected population relies mostly on smartphones to access the Internet as PC penetration remains low within financially vulnerable citizens. According to the research, 58% of Brazilians only access the web through their phones. More

  • in

    Sinclair confirms ransomware attack after TV station disruptions

    Sinclair Broadcast Group — which controls hundreds of TV stations across the US — has confirmed a ransomware attack on certain servers and workstations.In a statement and notice sent to the SEC, Sinclair said it was notified of a cybersecurity incident on Saturday, October 16. By Sunday, the company confirmed that it was a ransomware attack and backed up what many online had been reporting — outages at numerous local TV stations. “Data also was taken from the Company’s network. The Company is working to determine what information the data contained and will take other actions as appropriate based on its review. Promptly upon detection of the security event, senior management was notified, and the company implemented its incident response plan, took measures to contain the incident, and launched an investigation,” Sinclair said. “Legal counsel, a cybersecurity forensic firm, and other incident response professionals were engaged. The company also notified law enforcement and other governmental agencies. The forensic investigation remains ongoing. While the Company is focused on actively managing this security event, the event has caused – and may continue to cause – disruption to parts of the company’s business, including certain aspects of its provision of local advertisements by its local broadcast stations on behalf of its customers.” The company went on to say that it is unclear what kind of impact the attack will have on its “business, operations or financial results.” It did not say which ransomware group was behind the attack and did not respond to requests for comment. Sinclair controls 21 regional sports network brands while owning and operating 185 television stations in 86 markets. The company also controls the Tennis Channel as well as Stadium and had an annual revenue of $5.9 billion in 2020.The attack was first reported by The Record after viewers took to Twitter and Reddit to report confusion over outages in their local markets. 

    Internal sources told The Record that the attack involved the company’s internal corporate network, email servers, phone services, and the broadcasting systems of local TV stations. Dozens of channels were unable to show local morning shows and NFL games on Sunday. Some channels were able to resume broadcasts because the attack did not reach Sinclair’s “master control” broadcast system. But the attack is still crippling dozens of stations even as others return to normal. The company suffered another cyberattack in July that forced them to reset all shared administration systems at all of their stations. This is the second ransomware incident targeting news stations this year, with Cox Media Group recently admitting that it was hit with a ransomware attack in June. Ransomware experts like Darktrace’s Justin Fier said that for broadcasters and media, these attacks don’t only disrupt operations but potentially give bad actors a platform to distribute disinformation on a global stage. “In the case of the Sinclair breach, simply having access to the broadcast network may itself be more valuable for attackers than a ransomware payment,” Fier said. “The reality is that the organization’s back is against the wall — it is clear that the security team at Sinclair have been caught off guard and outpaced and now must decide between system downtime or paying a hefty ransom.”Others noted that it was not surprising to see the attack occur on a weekend when ransomware actors know IT departments are working with skeleton crews. Bill Lawrence, CISO at SecurityGate, noted that the attack didn’t spread to Sinclair’s ‘master control’ broadcast system, indicating they may be using network segmentation or a higher level of protection and care for the ‘crown jewels.’ “Also, they lost their internal network, email, phones, along with local broadcasting systems. For your next incident response plan drill, put the participants in separate rooms and forbid the use of company email or phone calls,” Lawrence said. “It would be hard for them to order a pizza together, much less work on business continuity.” More

  • in

    Seven smaller Australian telcos have half of all complaints referred to TIO: ACMA

    Image: Getty Images
    Telco complaints are down 17% across Australia per 10,000 services to a total of just under 1.1 million, but the Australian Communications and Media Authority (ACMA) has found the time taken for complaints to be resolved is spiking. Since the 2018-19 fiscal year, the weighted average days to resolve a complaint has moved from 8.2 days to 12.2 in 2020-21. Across 32 telcos measured in its report, ACMA found the median interval was 4.1 days, and the average was 5.4 days — numbers that were essentially steady compared to last year. The rate of complaints needing to be referred to the Telecommunications Industry Ombudsman Judy Jones, who will be leaving the post in March next year, has increased by 1.4 percentage points to 10.7% in the past year. “This suggests that some telcos are not handling complaints at all well, and other smaller telcos are in fact not recording complaints at all,” ACMA authority member Fiona Cameron said. “Seven smaller telcos have absurdly high escalation rates, just above 50%, which indicates that some complaints are not being recorded in the first place and only being logged when escalated to the TIO.” The seven telcos were not named in ACMA’s report, with the regulator saying it would be following up with the seven outfits. Overall, the number of complaints about NBN broadband dropped 36% to 84 per 10,000 services, with the most complained about technology being fibre to the basement (FttB) with 147 per 10,000 services, fibre to the curb (FttC) with 119, HFC with 93, and fibre to the node (FttN) with 77 complaints per 10,000 services.

    However, the change in complaints was down across all NBN technologies, FttB was down 22%, FttC dropped 43%, HFC fell 53%, and FttN was down 28%. The least complained about NBN connectivity, satellite, had 27 complaints per 10,000 services and saw a fall in complaints of 59%. By category, of the 263,000 complaints related to the NBN, 92,700 were classed as other, 86,500 were related to faults, 68,400 were classed as connection complaints, and only 15,600 were related to speed. On Monday, the company responsible for the National Broadband Network revealed the allocation of its portable assets for what it termed as Australia’s “disaster season”. The company said it gained 58 new pieces of temporary infrastructure, at a value of AU$6 million. The pieces include multi-tech trailers that have a generator, battery, optional solar for power, and can connect to fibre to the node network, as well as have fixed wireless and HFC as a “bolt on”; wireless mast trailers that can replicate an 18-metre wireless network tower; hybrid power cubes that have generator, battery, and solar to keep fixed wireless towers operational when grid power is lost; and network on wheels trailers that operate as a small exchange to support all NBN technologies other than satellite. Victoria walked away with a pair of multi-tech trailers, a wireless mast trailer, and 10 hybrid power cubes; NSW received the same, minus the wireless mast trailer; Western Australia also received the same trailers as Victoria, but only four cubes; Queensland was allocated one network on wheels trailer, a pair of multi-tech trailers, and eight cubes; South Australia is much the same as Queensland but has five cubes; Tasmania gets three cubes, one network trailer, and one multi-tech trailer, and the Northern Territory gets one network trailer and one multi-tech trailer. NBN added it would be rolling out up to 2,000 disaster satellite service sites at emergency management sites and evacuation centres to offer satellite connectivity during an emergency. At the start of the month, NBN announced it was starting what it called a Remote Community COVID Emergency Wireless Trial that was looking at temporary connectivity for regional and remote locations with a majority Indigenous population. “At the request of the Central Darling Council and the local community, NBN Co and our partners are installing a temporary community Wi-Fi solution to areas of Wilcannia to support the community during the COVID-19 health emergency. It will support local people’s access online education and social services and is currently planned to be in place for approximately 90 days,” an NBN spokesperson told ZDNet. “We have worked closely with community elders and leaders, the local council and the NSW Department of Education on the solution and where it will be located. Nominated households will be supplied by the participating RSP the equipment they need to connect. NBN Co will not charge the RSP for the Wi-Fi solution to be provided.” Households needed to be nominated by council to receive a self-installed Wi-Fi kit. Related Coverage More

  • in

    Acer hit with second cyberattack in less than a week, Taiwanese authorities notified

    Acer has confirmed yet another cyberattack on its servers in Taiwan after their offices in India were hit less than a week ago by the same group.The Desorden Group — which claimed responsibility for both attacks — contacted ZDNet and said part of why they conducted the second attack was to prove their point “that Acer is way behind in its cybersecurity effects on protecting its data and is a global network of vulnerable servers.” Acer spokesman Steven Chung told ZDNet that the company recently detected “an isolated attack on our local after-sales service system in India and a further attack in Taiwan.””Upon detection, we immediately initiated our security protocols and conducted a full scan of our systems. We are notifying all potentially affected customers in India, while the attacked Taiwan system does not involve customer data,” Chung said. “The incident has been reported to local law enforcement and relevant authorities, and has no material impact to our operations and business continuity,” he added.The group said it hacked Acer’s Taiwan servers that stored data on its employees and product information. “We did not steal all data, and only took data pertaining to their employee details. Right after the breach, we informed Acer management on the Taiwan server breach and Acer has since taken the affected server offline,” the group said in an email to ZDNet. 

    “Also, a few other of its global networks including Malaysia and Indonesia servers are vulnerable too.”The group did not say how much data they stole in this attack and did not respond to questions about what its end-goal is with these breaches. Acer has had a rough year from a cybersecurity perspective, suffering a ransomware attack in March that led to a previously-unheard ransom demand of $50 million. It is unclear if Acer ever paid the ransom. The attack last week on the company’s servers in India led to 60GB of files being stolen by the Desorden Group, which also claimed an attack on the Malaysian servers of ABX Express Enterprise in September. Acer India was hit with a similar cyberattack in 2012 by a Turkish cybercriminal group, according to DataBreaches.net. The attackers defaced the company website and leaked 20,000 user credentials at the time.  More

  • in

    Gartner survey of CIOs highlights investments in AI, cloud and cybersecurity

    A new survey from Gartner found that a majority of CIOs are focusing their investments this year and next year on AI and distributed cloud technology.The 2022 CIO and Technology Executive Survey features data gleaned from 2,387 CIO and technology executive respondents in 85 countries, representing about $9 trillion in revenue/public-sector budgets and $198 billion in IT spending. The survey focused on on “business composability” — which involves the mindset, technologies and set of operating capabilities that enable organizations to innovate and adapt quickly to changing business needs.Monika Sinha, research vice president at Gartner, said business composability is an “antidote to volatility.””Sixty-three percent of CIOs at organizations with high composability* reported superior business performance compared with peers or competitors in the past year. They are better able to pursue new value streams through technology, too,” Sinha said, adding that the findings from the survey were presented during the Gartner IT Symposium/Xpo Americas. Topping the list of planned investments for 2022, cyber and information security was cited by 66% of all respondents as an area that they expected to increase investment for next year. More tha half said business intelligence and data analytics would also be areas where they plan to invest heavily next year. “There is a continued need to invest in cybersecurity as the environment becomes more challenging. A high level of composability would help an enterprise recover faster and potentially even minimize the effects of a cybersecurity incident,” Sinha said.

    CIOs and technology executives at high-composability enterprises told Gartner that for 2022, they expect an increase in revenues by about 7.7% and a growth in IT budgets by about 4.2%. Low-composability enterprises only expect both to increase by 3.4% and 3.1%, respectively, according to Gartner. Sinha explained that most high-composability enterprises set up strategic planning and budgeting as a continuous and iterative activity to adjust to change more easily. “Without big deficits to remedy elsewhere, CIOs can afford to invest in composability, especially for IT developers and business architects who can design in a composable manner,” Sinha said, adding that globally, IT budgets are expected to grow at the fastest rate in over ten years with an average growth of 3.6% in overall IT budget for 2022 reported among all survey respondents.The survey also focused on how CIOs can push for composable thinking, composable business architecture and composable technology.”Business composability isn’t uniformly high across the economy because it requires business thinking to be reinvented. Traditional business thinking views change as a risk, while composable thinking is the means to master the risk of accelerating change and to create new business value,” Sinha added.”Digital business initiatives fail when business leaders commission projects from the IT organization and then shirk accountability for the implementation results, treating it as just another IT project. Instead, high-composability enterprises embrace distributed accountability for digital outcomes, reflecting a shift that most CIOs have been trying to make for several years, as well as creates multidisciplinary teams that blend business and IT units to drive business results.”Sinha noted that business runs on technology, but technology itself must be composable to run composable businesses. Composability, Sinha explained, needs to extend throughout the technology stack, from infrastructure that supports rapid integration of new systems and new partners to workplace technology that supports the exchange of ideas.”CIOs at moderate-or low-composability enterprises must internalize these three domains of business composability to make their organization nimbler and well equipped to handle the rapidly changing business environment in which they operate,” Sinha said. “It’s a gradual, but imperative, process going into 2022 and beyond.”  More

  • in

    Generative AI, autonomic systems, hyperautomation and more top Gartner list of top tech trends in 2022

    special feature

    AI and the Future of Business

    Machine learning, task automation and robotics are already widely used in business. These and other AI technologies are about to multiply, and we look at how organizations can best take advantage of them.

    Read More

    AI engineering, cloud-native platforms and autonomic systems were just a few of the trends that topped Gartner’s list of the strategic technology trends that organizations need to explore in 2022.Released on Monday at the Gartner IT Symposium/Xpo Americas, the list covers the tools and technology that will drive innovation in the next year. David Groombridge, research vice president at Gartner, said CEOs and boards are striving to find growth through direct digital connections with customers. CIOs’ priorities need to reflect the same business imperatives. “CIOs must find the IT force multipliers to enable growth and innovation, and create scalable, resilient technical foundations whose scalability will free cash for digital investments,” Groombridge said. “These imperatives form the three themes of this year’s trends: engineering trust, sculpting change and accelerating growth.”First on the list was generative AI, which Gartner described as machine learning methods that learn about content or objects from their data and use it to generate brand-new, completely original, realistic artefacts.Tasks like software code creation, drug development facilitation and targeted marketing can be augmented using generative AI. Gartner noted that there is also the possibility that generative AI is used for scams, fraud, forgery and political disinformation. Still, by 2025 the research institute expects it to account for 10% of all data produced, up from less than 1% today.Gartner said cloud-native platforms will also play a major role in delivering capabilities anywhere and everywhere next year as enterprises move away from “lift and shift” migrations. Gartner predicted that cloud-native platforms will serve as the foundation for more than 95% of new digital initiatives by 2025 — up from less than 40% in 2021 — because they use the core capabilities of cloud computing to provide scalable and elastic IT-related capabilities “as a service” to technology creators using internet technologies.

    Autonomic systems were also featured on the list, with Groombridge noting that autonomic behavior has “already made itself known through recent deployments in complex security environments, but in the longer term, will become common in physical systems such as robots, drones, manufacturing machines and smart spaces.”Gartner described autonomic systems as “self-managing physical or software systems that learn from their environments.” “Unlike automated or even autonomous systems, autonomic systems can dynamically modify their own algorithms without an external software update, enabling them to rapidly adapt to new conditions in the field, much like humans can,” Gartner explained.Gartner also predicted that as the number of data and application silos continues to surge, there will be a need for data fabrics, which allow for “a flexible, resilient integration of data across platforms and business users.”With millions of people around the world still working from home due to the COVID-19 pandemic, Gartner explained that the distributed enterprise will most likely replace the traditional office-centric organizations of past years. By 2023, Gartner is expecting 75% of organizations that benefit from distributed enterprises to see revenue growth 25% faster than competitors.”This requires CIOs to make major technical and service changes to deliver frictionless work experiences, but there is another side to this coin: the impact on business models,” said Groombridge. “For every organization, from retail to education, their delivery model has to be reconfigured to embrace distributed services. The world didn’t think they’d be trying on clothes in a digital dressing room two years ago.” Decision intelligence, composable applications, hyperautomation, privacy-enhancing computation, cybersecurity mesh, AI engineering and “total experience” rounded out the list of tech trends coming in the next year. 

    Artificial Intelligence More

  • in

    Netgear Orbi Quad-Band Mesh WiFi 6E System (RBKE963): Fast but expensive wireless mesh networking

    Netgear was one of the first manufacturers to introduce a router supporting the new Wi-Fi 6E standard, with its Nighthawk RAXE500. The company has now brought the latest 2.4/5/6GHz wi-fi technology to its Orbi range of mesh networking systems.  The new system — the Orbi Quad-Band Mesh WiFi 6E System (RBKE963), to give its full name — is primarily aimed at home users but, like the business-oriented Orbi Pro, it does have the ability to create multiple networks for different tasks or different groups of users. And, with its support for both high-speed Wi-Fi 6E and multi-gig Ethernet, the Orbi RBKE963 provides performance that will be ideal for working from home, as well as many offices or public venues that need a wide-ranging mesh network.  Netgear’s Orbi Quad-Band Mesh WiFi 6E System comprises a primary router (middle, above) with a 10Gbps internet port, a 2.5Gbps Ethernet port and three Gigabit Ethernet ports, plus satellites (above right) with 1x 2.5Gbps and 3x 1Gbps ports. Wi-Fi 6E support delivers a 6GHz band on top of two 5GHz bands and one 2.4GHz band for total wireless throughput of 10.8Gbps.
    Images: Netgear
    Orbi RBKE693: now also available in black.
    Image: Netgear
    One obvious difference between the new Orbi and its predecessors is that it’s now available in both black and white, as Netgear says that many users have requested the additional black option to match their home decor. It’s slightly larger than its predecessors too, as the slimline upright units now house no less than 12 separate antennae in order to increase the network range and make the most of the greater speeds supported by Wi-Fi 6E.  Those speeds are pretty impressive too, as the quad-band Orbi uses Wi-Fi 6E technology to add a fourth wi-fi band on the 6GHz frequency, along with the existing two 5GHz bands and single 2.4GHz band already supported by Wi-Fi 6 and Wi-Fi 5. That 6GHz band alone supports speeds of up to 4.8Gbps, with an additional 2.4Gbps on each of the 5GHz bands, and 1.2Gbps on the 2.4GHz, to provide a total maximum speed of 10.8Gbps.  Netgear has also updated the Orbi’s wired connectivity, to keep pace with the improved wi-fi performance. As always, the Orbi systems consist of a primary router and a number of additional ‘satellites’, which link together to form the mesh network. The main router now provides a 10Gbps Ethernet WAN port for high-speed internet connections, and both the main router satellites also include one 2.5Gbps Ethernet port and three Gigabit ports for wired connections.Like the Orbi Pro models that are specifically designed for business users, this new Orbi model has the ability to create multiple networks (SSIDs). There is one network on the 6GHz band that can be devoted to new devices, such as smartphones and computers — or even Samsung’s new 8K OLED TVs — that support Wi-Fi 6E. One of the 5GHz bands provides the main, general-purpose network, with the second 5GHz band acting as a dedicated ‘backhaul’ that connects the router and satellites. Finally, the 2.4GHz band acts as an IoT network for devices such as smart lights and security cameras. 

    Top ZDNET Reviews

    That high-end performance comes at a price, though. Due to ship at the end of October, the Orbi Quad-Band Mesh WiFi 6E System (RBKE963) currently costs a hefty £1,499.99 (inc. VAT), or $1499.99. That price is for a three-piece kit with one router and two satellites, which can cover areas up to 9,000 square feet.A three-piece Orbi Quad-Band Mesh WiFi 6E System (£/$1,499.99) can cover an area up to 9,000sq ft.
    Image: Netgear
    Netgear has told us that there’s a 2-piece kit with one router and one satellite planned for future release. It’s also worth noting that regulatory approval for use of the 6GHz band differs in the UK and US, so UK users may find that quoted speeds and coverage areas may differ when the Orbi RBKE963 goes on sale in the UK. RECENT AND RELATED CONTENT Netgear Nighthawk RAXE500 Tri-Band Wi-Fi 6E Router, hands on: High-performance, high-capacity  Netgear Nighthawk Wi-Fi routers go mesh  Netgear Orbi WiFi 6 AX4200, hands-on: Affordable WiFi 6 coverage for homes and businesses  Netgear Orbi Pro WiFi 6 (SXK80), hands-on: Premium mesh networking for small businesses and home workers  Best mesh Wi-Fi system 2021: Top routers compared  Read more reviews More