As you may have heard, the F.B.I. released an urgent bulletin just before the Memorial Day weekend advising that everyone reboot their routers, especially those with home and small office internet routers.
So what’s going on?
The F.B.I.’s recommendation comes on the heels of a newly discovered malware threat called VPNFilter. According to researchers from Cisco’s Talos Intelligence Group, the malware contains a killswitch for routers, and is capable of stealing passwords and monitoring industrial control systems.
What devices are known to be affected by VPNFilter?
To date, VPNFilter is known to be capable of infecting enterprise and small office/home office routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices. These include:
What steps should you take?
While all of Universal Data’s recommended routers and switches have the appropriate protocols in place to protect against this specific threat, we advise you to follow the F.B.I.’s instructions and perform the following steps on your small office or home office router.
1. Reboot the device
This will temporarily disrupt the malware if it is present. If you are a managed client and running a device in need of a reboot, we will coordinate a reboot window.
2. Upgrade the device’s firmware
Make sure your router and any other network devices you are using are updated to the latest firmware. (Universal Data handles this for all managed service customers)
3. Select a new secure password.
Ditch the password provided out of the box for a stronger password. And enable encryption, if that’s available on your device.
If you have any questions or would like to know how Universal Data can keep your data secure, please email us at firstname.lastname@example.org.