The Federal Bureau of Investigation said Friday anyone with a small office or home router should reboot it to stop the spread of malware. A potential attack had infected hundreds of thousands devices across 54 countries with software called VPNFilter, which was traced back to Ukraine where it was first found in 2016, it said.
The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices. Owners are advised to consider disabling remote management settings on devices. Network devices should be upgraded to the latest available versions of firmware.
Below we’ve listed the devices known to have been impacted thus far:
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices running QTS software
- TP-Link R600VPN
If you have one of these devices, it’s strongly advised to reboot. Please don’t hesitate to reach out to us by email or phone if you have any additional questions or concerns related to any security issue.