WISH-TV | wishtv.com
The FBI and US Department of Justice have released a public action notice for all internet router users to reboot their device due to a threat of malware known as “VPNFilter.” This malware has been found in over 500,000 routers in 54 countries which Cisco Talos Intelligence has released a report discussing the findings.
When a router becomes infected, it allows hackers theft of website credentials and personal information. Taking it a step further, “VPNFilter” can also wipe portions of a device’s firmware, either individually or multiple devices at once, making them unusable.
A list of routers includes Small Office/Home Office (SOHO) and Network-attached storage (NAS) devices under the following specifications:
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- MikroTik RouterOS for Cloud Core Routers: Versions 1016, 1036 and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices running QTS software
- TP-Link R600VPN
How do I reboot?
- Unplug your router and wait 60 seconds before plugging it back in.
- If your router has an app, visit the device settings and click the reboot option.
Rebooting the router will remove components of the VPNFilter malware and allow for the FBI to identify infected devices.
Always remember to upgrade to the latest versions of firmware across your router, mobile device, tablet and computer to prevent any potential attacks from happening.