VPNFilter Malware
Hackers have exploited vulnerabilities in a number of home routers allowing them to intercept the contents of traffic coming in and out of affected networks for things such as usernames and passwords. While our CompassComplete client’s business networks are safe from this type of exploit, your home router may not be. Because of this, we’re letting clients know what actions should be taken.
- Reboot your home router (this will only temporarily remove phases 2 and 3 of the exploit)
- Verify if you are using a known model that’s affected and if so, upgrade the firmware if available from the manufacturer or replace the router.
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices running QTS software
- TP-Link R600VPN
- As an alternative to checking the model and firmware you are using, consider utilizing your internet service providers WiFi option instead of self-managing a router.
Concerned about cybersecurity for your business? Contact us to learn more about our 360-degree approach to security.