Photo: ARSTECHNICA.
Cisco researchers said VPNFilter began to be distributed at least in 2016 and has now spread at least in 54 countries.
VPNFilter attacks have skyrocketed in the past 3 weeks and recently the hacker group has improved to increase the attack capacity of this malicious code, causing Cisco researchers to issue a warning report even though the code research Their VPNFilter exclusive is not complete.
According to updated information, a primary server used to attack routers using VPNFilter has been seized by the US Federal Bureau of Investigation (FBI).
Yesterday (May 23), Symantec antivirus software vendor announced that router devices were attacked by VPNFilter malware including:
According to Cisco and Symantec's advice, if a user is using one of the routers on the list, reset the device by holding down a button behind the router for 5-10 seconds. After the device restarts, the user will have to log in again because the reset has deleted all existing configuration settings.
Users should reinstall the device's password and upgrade the latest firmware to the Router even though it is unclear but this will help prevent this malicious infection in any case.
According to experts, there is no simple way to determine if a router is infected with VPNFilter.
See more: