{"id":12475,"date":"2018-06-04T10:00:02","date_gmt":"2018-06-04T18:00:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/04\/news-6244\/"},"modified":"2018-06-04T10:00:02","modified_gmt":"2018-06-04T18:00:02","slug":"news-6244","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/04\/news-6244\/","title":{"rendered":"FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware?"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 04 Jun 2018 14:45:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"238\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-238x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-238x300.jpg 238w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-768x968.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-813x1024.jpg 813w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-640x806.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-900x1134.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-440x554.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-380x479.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router.jpg 1288w\" sizes=\"auto, (max-width: 238px) 100vw, 238px\" \/><\/p>\n<p>You might have seen reports that the <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180525.aspx\">FBI is warning<\/a> home users of a new foreign cyber-attack campaign targeted at your routers and network-attached storage (NAS) devices. Here\u2019s a breakdown of exactly what has happened, and what you need to do to keep your home IT systems safe and secure.<\/p>\n<p><strong>What is VPNFilter?<\/strong><\/p>\n<p>This is the name of the new malware threat facing home users globally. At least 500,000 small and home office (SOHO) routers and network attached storage (NAS) devices have been infected by the malware. It has <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-actions-disrupt-advanced-persistent-threat-28-botnet-infected\">been blamed<\/a> by the Justice Department on a Russian cybercrime group known as APT28 or \u201cFancy Bear\u201d with links to the Kremlin.<\/p>\n<p>&nbsp;<\/p>\n<p>It\u2019s unknown exactly why the malware is being spread, but it has several capabilities. VPNFilter could:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Monitor your internet traffic and steal sensitive data, such as website log-ins<\/li>\n<li>Render the device completely unusable via a \u201ckill\u201d command<\/li>\n<li>Use your devices to route\/launch attacks on other targets<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Have I been hit?<\/strong><\/p>\n<p>Unfortunately, it\u2019s difficult to tell if your device has been affected as the malware is designed to operate covertly in several stages. The devices <a href=\"https:\/\/blog.talosintelligence.com\/2018\/05\/VPNFilter.html\">named as vulnerable<\/a> to this campaign include, but may not be limited to:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Linksys:<\/strong> E1200, E2500, WRVS4400N<\/li>\n<li><strong>Mikrotik:<\/strong> 1016, 1036, 1072<\/li>\n<li><strong>Netgear:<\/strong> DGN2200, R6400, R7000, R8000, WNR1000, WNR2000<\/li>\n<li><strong>QNAP:<\/strong> TS251, S439 Pro, and other QNAP NAS devices running QTS software<\/li>\n<li><strong>TP-Link:<\/strong> R600VPN<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How do I stay safe?<\/strong><\/p>\n<p>It\u2019s not known exactly how the hackers managed to infect the 500,000 devices hit so far, but the models listed above contain publicly known software vulnerabilities and\/or feature default passwords, which make them easy to attack.<\/p>\n<p>The best course of option is therefore to at least follow the FBI\u2019s advice and reboot your router. Better yet, follow Cisco\u2019s and reset. In more detail:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Reset\/Restore to factory settings. You can usually do this by holding down the small recessed button labelled \u201creset\u201d with a paper clip or similar for five to ten seconds. Note that all your custom settings will be lost.<\/li>\n<li>Reboot the device. (The reset should reboot it anyway. Doing this <em>without<\/em> a reset will at least temporarily disrupt the malware and aid identification of infected devices by investigators).<\/li>\n<li>Log-in to your device admin page via your browser using the default ID and password, since your custom log-in will be gone. (Check the console address and default log-in from your router\/NAS provider. Also, it\u2019s typically given on the QuickStart card or in the Setup section of the User\u2019s Guide).<\/li>\n<li>Change the factory default admin name if you can, but definitely the default password to a strong one you can remember. Or use your password manager to generate one and save it in the password manager by logging out once you change it and then doing another login.<\/li>\n<li>Apply the latest firmware if available and reboot again. (This may be done automatically by your provider. But to double-check, visit the same admin page and click through to the software\/firmware tab. Often you\u2019re notified if there\u2019s a firmware update available; or you can click a button to find out. If not, then your provider is responsible for the firmware update.)<\/li>\n<li>Make sure remote administration is disabled in the router. (It should be, by default. If not, disable it.) This helps prevent hackers from remotely getting onto your network via the router.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Trend Micro will be monitoring this ongoing threat, so stay tuned for more insight and updates on how to stay safe. For current technical info on the threat, read <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/reboot-your-routers-vpnfilter-infected-over-500-000-routers-worldwide\">Reboot Your Routers<\/a> on Trend Micro Security News or this article from <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware\/\">ArsTechnica<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/fbi-router-reboot-warning-how-do-i-stay-safe-from-new-vpnfilter-malware\/\">FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/fbi-router-reboot-warning-how-do-i-stay-safe-from-new-vpnfilter-malware\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Mon, 04 Jun 2018 14:45:43 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"238\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-238x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-238x300.jpg 238w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-768x968.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-813x1024.jpg 813w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-640x806.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-900x1134.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-440x554.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router-380x479.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/router.jpg 1288w\" sizes=\"auto, (max-width: 238px) 100vw, 238px\" \/><\/p>\n<p>You might have seen reports that the FBI is warning home users of a new foreign cyber-attack campaign targeted at your routers and network-attached storage (NAS) devices. Here\u2019s a breakdown of exactly what has happened, and what you need to do to keep your home IT systems safe and secure. What is VPNFilter? This is&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/fbi-router-reboot-warning-how-do-i-stay-safe-from-new-vpnfilter-malware\/\">FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,18625,714,18514],"class_list":["post-12475","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-fbi-router-reboot-warning","tag-security","tag-vpnfilter"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12475"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12475\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12475"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}