Latest reports and data says that, recently, a malware infected around 500,000 home and small business routers. This malware attach has the ability to collect passwords and can also attacks on other connected devices and can also permanently disable the machines.
“Because the affected devices are owned by businesses or individuals, malicious activities conducted from those devices can be mistakenly attributed to those who were actually victims,” William Largent – Talos researcher
According to Symantec, these are top major targets of VPNFilter:
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- RouterOS of three models of the Microtik Cloud Core Router: 1016, 1036 and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices with QTS
- TP-Link R600VPN
How to prevent?
Here are few tips to secure your routers from Malware Attacks.
- SOHO and NAS routers Users reset their routers to factory defaults setting and reboot them to remove non-persistent, potentially destructive stage 2 and stage 3 malware.
- Internet service providers who are using SOHO routers reboot all their routers on their customers’ behalf.
- Make sure that your device is Up-to-Date.
- Make sure your devices are patched with the recent firmware/software versions.