Electronic Security Service: “VPNFilter infects network devices!”
The Electronic Security Service under the Ministry of Transport, Communications and High Technologies has issued a message in connection with the threats posed by malicious software named VPNFilter.
VPNFilter, which has infected nearly 500 thousand computer devices in more than 50 countries, targets Linksys, MikroTik, NETGEAR, QNAP NAS and TP-Link routers, including home and office network devices (SOHO).
VPNFilter filters data stored on devices and steals personal information.
In this connection, the Electronic Security Service recommends administrators and users who underwent VPNFilter attack to restore their devises to factory settings, download and configure the latest software updates, and to disable the remote access function (if not used) on their devises.
Users can update the software of network devices (firmwire) through the websites of their manufacturers (
Linksys,
MikroTik,
NETGEAR,
QNAP, TP-Link).