This week the FBI issued a public service announcement to warn against a Russian-linked VPN-Filter malware that has infected half a million routers worldwide.
VPN-Filter is designed to collect information passing through the router, encrypt it, and pass that information on to third-parties. It can also make your router stop working properly.
While it is statistically unlikely that you are experiencing networking issues related to this threat specifically, routers are often targets for hackers because they are always on and rarely does the end user install updates on this equipment. We wanted to let people know that despite the widespread media attention, there is not really anything to worry about for most people.
Only a small list of routers (below) were supposedly affecting by the VPN-filter Malware but if you have a concern, start by power cycling your router: unplug the device from power for 30 seconds and plug it back in. For the more complex fixes, such as turning off remote administration, changing passwords, upgrading to the latest firmware and even the only sure fire way to remove VPNFilter, reseting the router to factory defaults, give us a call.
Our Road Techs are also more than happy to come on site to check for updates and perform other network optimization so that your hardware is secure and performing as best it can.
List of affected routers:
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices running QTS software
- TP-Link R600VPN