Warning: New malicious code is infecting about 500,000 router devices

Cisco researchers have released a warning warning about a malicious malicious code called VPNFilter, which is spread by a group of hackers spreading more than 500,000 home or small companies' devices across the globe. world.

Cisco researchers have released a warning warning about a malicious malicious code called VPNFilter, which is spread by a group of hackers spreading more than 500,000 home or small companies' devices across the globe. world.

Router devices from many familiar manufacturers like Linksys, MikroTik, Netgear, TP-Link and even QNAP storage devices have also been infected with this VPNFilter.

Hackers can use VPNFilter to collect communications, open attacks to other devices and with a single command can permanently destroy the device. In particular, even if the device has been restarted, it cannot remove this malicious code.

Warning: New malicious code is infecting about 500,000 router devices Picture 1Warning: New malicious code is infecting about 500,000 router devices Picture 1
Photo: ARSTECHNICA.

Cisco researchers said VPNFilter began to be distributed at least in 2016 and has now spread at least in 54 countries.

VPNFilter attacks have skyrocketed in the past 3 weeks and recently the hacker group has improved to increase the attack capacity of this malicious code, causing Cisco researchers to issue a warning report even though the code research Their VPNFilter exclusive is not complete.

According to updated information, a primary server used to attack routers using VPNFilter has been seized by the US Federal Bureau of Investigation (FBI).

Yesterday (May 23), Symantec antivirus software vendor announced that router devices were attacked by VPNFilter malware including:

Warning: New malicious code is infecting about 500,000 router devices Picture 2Warning: New malicious code is infecting about 500,000 router devices Picture 2

According to Cisco and Symantec's advice, if a user is using one of the routers on the list, reset the device by holding down a button behind the router for 5-10 seconds. After the device restarts, the user will have to log in again because the reset has deleted all existing configuration settings.

  1. Instructions for configuring Cisco routers
  2. Cisco Router Configuration Guide 1800 series (Cisco 1801, 1802, 1803, 1811, 1812)

Users should reinstall the device's password and upgrade the latest firmware to the Router even though it is unclear but this will help prevent this malicious infection in any case.

According to experts, there is no simple way to determine if a router is infected with VPNFilter.

See more:

  1. Warning: new code of virtual money digging is available via Facebook Messenger
  2. Microsoft Office 365 version is supported against blackmail
  3. Warning: GandCrab extortionist code is attacking Vietnam
4 ★ | 1 Vote