VPNFilter state-affiliated malware pose lethal threat to routers

froggyboy604

Well-Known Member
Staff member
Manager
Full GL Member
29,665
2007
799
Credits
19,186
Mature Board Viewing
Unlock full profile styling
Security reports from Cisco and Symantec are giving off. Believed to be state-affiliated or, worse, state-sponsored, the modular VPNFilter malware has already infected around 500,000 routers, not just collecting data but even possibly rendering them completely useless at the push of a button.

VPNFilter state-affiliated malware pose lethal threat to routers

This does look like a bad router malware which is difficult for most users to detect since most routers don't have antivirus and antimalware scanners.

Using a software firewall in Windows and VPN connection, or proxy server can be a good idea since you don't always know or easily find out if the router you are using is hacked, or your home router is hacked unless you can view what tasks are running on your router.
 
apparently it will only affect linksy and netgear routers, my ASUS is safe :grin:
 
apparently it will only affect linksy and netgear routers, my ASUS is safe :grin:

There are also routers from TP-link, QNAP, Mikrotik on the affected list on the articles.
Symantec has released a list of devices known to be affected by VPNFilter:

Linksys E1200
• Linksys E2500
• Linksys WRVS4400N
• Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
• Netgear DGN2200
• Netgear R6400
• Netgear R7000
• Netgear R8000
• Netgear WNR1000
• Netgear WNR2000
• QNAP TS251
• QNAP TS439 Pro
• Other QNAP NAS devices running QTS software
• TP-Link R600VPN

VPNFilter state-affiliated malware pose lethal threat to routers
 
Back
Top