[Updated 6/6/18] Protect Your Router, Now (VPNFilter Malware)
Note: Updates will be added to the bottom of this post. On, 6/6/2018, additional router models were added to the list of affected devices.
It’s important that all Internet users take action to secure their Internet router to avoid very real negative consequences. The items below briefly describe what steps are necessary. For those who are uncomfortable with any of the steps, after step number one, please contact Widomaker, a local computer shop, or the Support Department of the manufacturer of your Internet router, for guidance.
1.) Everyone Should Reboot/Power Cycle (Off and Back On) their Internet Router
Recommendations from the DHS, FBI, DOJ, and cybersecurity researchers, instruct owners of home and small office routers, and NAS (Network Attached Storage) devices, to power cycle (reboot) their devices as soon as possible.
As a result, Widomaker urges all customers to power cycle (off and back on) their Internet routers, regardless of their router brand or model, as recommended by cybersecurity researchers and government organizations. Please do this, immediately. But, don’t stop there…
2.) Check for Router Updates (Firmware)
Contact your router manufacturer (or visit their website) to determine if your router has updated firmware available, and how to install it. Contact Widomaker or a local computer shop for assistance with this step, if necessary.
If your router is several years old, the manufacturer may no longer be supporting, and offering updates for, that model of router. Contact your router manufacturer to determine if your model of router is still supported, and eligible for updates. If your router is no longer supported, it should be replaced with a new router that is supported by the manufacturer. Contact Widomaker, or a local computer shop, if you need suggestions for a replacement router, or help determining if your existing router is still supported.
3.) Change the default admin password
A router’s administrator (admin) password is used to prevent unauthorized persons from accessing the web-based setup page of your router and changing any of its settings. Routers usually come with a default username and password. That default password should be changed, during the setup process, to prevent unauthorized access. Please note that the wireless network password that you use to connect devices to the wireless network is different from the router administration password.
Check the instructions that came with your router, contact your router manufacturer, or visit their website, for instructions to change the default admin password. Contact Widomaker, or a local computer shop, if you need help changing your router’s admin password.
Once you’ve set or changed your router’s admin password, be sure to record it in a save place. Taping a note, with the password, to the bottom of the router, is a common practice. However, it’s important that only trusted people would have physical access to the router with the note attached.
4.) Factory Reset*
If you use one of the routers that is on the list of vulnerable models (further below), additional recommendations include performing a factory reset. If you are not familiar with how to perform a factory reset, you may want to contact Widomaker or a local computer shop for assistance.
*Warning: Performing a factory reset on your router will delete all of it’s settings, including the information it needs to login to your Internet provider. Widomaker DSL users will not be able to connect to the Internet after performing a factory reset, until the router has been reconfigured with the necessary DSL PPPoE login settings. Make sure you have the necessary DSL PPPoE settings, and the necessary instructions, from your router manufacturer, for how to reconfigure your router, before performing a factory reset. Contact Widomaker or a local computer shop, in advance, if you need assistance.
Support contact information for several popular router manufacturers are listed, below…
Router Models Known to be affected by VPNFilter Malware
It is not easy to determine if a router has been infected with this malware. However, there is a list of router models that are known to be vulnerable, and could be infected. This list will likely be updated, in the future, to include additional routers as researchers learn about other vulnerable devices. As of
5/25/2018 6/6/2018, the list of devices known to be vulnerable include…
RB Groove (new)
RB Omnitik (new)
Other QNAP NAS devices running QTS software
PBE M5 (new)
Unknown Models* (new)
ZXHN H108N (new)
Update 6/6/2018: An update has been published with additional information about this malware. It includes an updated list of devices known to be affected. They still believe that this updated list may still be incomplete and other devices may be affected.