[et_pb_section bb_built=”1″ fullwidth=”on” _builder_version=”3.0.98″ background_image=”https://www.mdsny.com/wp-content/uploads/2018/01/hack-ai.png” custom_padding=”0px|0px|33px|0px|false|false” next_background_color=”#ffffff”][et_pb_fullwidth_header title=”List of VPNFilter botnet hacked routers (UPDATED 6/7) ” subhead=”FBI says to Reboot and patch now!” background_overlay_color=”rgba(12,12,12,0.32)” _builder_version=”3.3.1″ title_font=”||||||||” title_text_color=”#ffffff” title_font_size=”67px” subhead_font=”||||||||” subhead_text_color=”#ffffff” subhead_font_size=”34px” background_color=”rgba(255, 255, 255, 0)” background_layout=”light”]

 

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section bb_built=”1″ _builder_version=”3.0.47″ custom_padding=”36px|0px|0px|0px” prev_background_color=”#000000″ next_background_color=”#ebebeb”][et_pb_row make_fullwidth=”on” custom_padding=”0px|0px|0px|0px” _builder_version=”3.0.98″][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.67″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_last_edited=”on|desktop” custom_margin_tablet=”10%||10%|10%” custom_margin_phone=”5%||5%|5%” custom_margin_last_edited=”on|desktop”]

At least half a million routers and storage devices in dozens of countries around the world have been infected by a sophisticated botnet, in preparation for an alleged planned cyber attack on Ukraine.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” use_custom_gutter=”on” gutter_width=”1″ custom_padding=”0px|0px|0px|0px” parallax_method_1=”off” parallax_method_2=”off” padding_top_1=”2%” padding_right_1=”8%” padding_bottom_1=”5%” padding_left_1=”8%” padding_1_tablet=”0%|5%|5%|5%” padding_1_phone=”|||” padding_1_last_edited=”on|desktop” _builder_version=”3.0.67″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.67″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_last_edited=”on|desktop” custom_margin_tablet=”10%||10%|10%” custom_margin_phone=”5%||5%|5%” custom_margin_last_edited=”on|desktop”]

The US Federal Bureau of Investigation (FBI) has obtained court orders and has taken control of the command and control servers of a massive botnet of over 500,000 devices, known as the VPNFilter botnet. The existence of this massive threat came to light yesterday when Cisco Talos published a report about VPNFilter infecting over 500,000 routers and NAS devices across the world.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2018/05/linksys2.jpg” _builder_version=”3.3.1″ max_width=”68%” module_alignment=”left” custom_margin=”|||” custom_padding=”30px|||100px”]

[/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0%||0%|” column_padding_mobile=”on” parallax_method_1=”off” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”48″ text_font_size_phone=”36″ text_font_size_last_edited=”on|phone” text_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width=”86%” module_alignment=”center” custom_css_main_element=”font-weight:900;”]

FBI asks users to reset devices to get a list of victims

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” use_custom_gutter=”on” gutter_width=”1″ custom_padding=”0px|0px|0|0px|false|false” parallax_method_1=”off” parallax_method_2=”off” padding_top_2=”4%” padding_right_2=”8%” padding_bottom_2=”5%” padding_left_2=”8%” padding_2_tablet=”0px|5%|5%|” padding_2_phone=”0px|5%|5%|5%” padding_1_last_edited=”off|desktop” padding_2_last_edited=”on|desktop” _builder_version=”3.4.1″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_color=”#ebebeb”][et_pb_column type=”1_2″][et_pb_video src=”https://www.youtube.com/watch?v=o5_JRqOLfM4″ _builder_version=”3.3.1″ custom_padding=”75px|||50px”]

[/et_pb_video][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.3.1″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_last_edited=”on|desktop” custom_margin_tablet=”10%||10%|10%” custom_margin_phone=”5%||5%|5%” custom_margin_last_edited=”on|desktop”]

With the domain firmly in its grasp, the FBI is now asking users across the world who own affected routers and NAS devices to reset their equipment.

The reasoning, according to the FBI, is to make these devices reconnect to the command and control server, giving the FBI a full insight into the botnet’s real size.

The FBI plans to use this knowledge to create a list of vulnerable devices and notify ISPs, private and public sector partners that can deal with the infected devices.

Owners of the following types of devices are vulnerable to the VPNFilter malware, and should reboot their devices, based on the FBI’s advice:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0%||0%|” column_padding_mobile=”on” parallax_method_1=”off” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”48″ text_font_size_phone=”36″ text_font_size_last_edited=”on|phone” text_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width=”86%” module_alignment=”center” custom_css_main_element=”font-weight:900;”]

Owners of the following types of devices are vulnerable to the VPNFilter malware, and should reboot their devices, based on the FBI’s advice:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_fullwidth=”on” use_custom_gutter=”on” gutter_width=”1″ custom_padding=”0||0||false|false” parallax_method_1=”off” parallax_method_2=”off” padding_top_1=”2%” padding_right_1=”8%” padding_bottom_1=”5%” padding_left_1=”8%” padding_1_tablet=”0%|5%|5%|5%” padding_1_last_edited=”on|desktop” _builder_version=”3.4.1″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_color=”#ebebeb”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.67″ text_font=”Source Sans Pro||||” text_text_color=”#303030″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_last_edited=”on|desktop” custom_margin_tablet=”10%||10%|10%” custom_margin_phone=”5%||5%|5%” custom_margin_last_edited=”on|desktop”]

Asus Devices:
RT-AC66U (new)
RT-N10 (new)
RT-N10E (new)
RT-N10U (new)
RT-N56U (new)
RT-N66U (new)

D-Link Devices:
DES-1210-08P (new)
DIR-300 (new)
DIR-300A (new)
DSR-250N (new)
DSR-500N (new)
DSR-1000 (new)
DSR-1000N (new)

Huawei Devices:
HG8245 (new)

Linksys Devices:
E1200
E2500
E3000 (new)
E3200 (new)
E4200 (new)
RV082 (new)
WRVS4400N

Mikrotik Devices:
CCR1009 (new)
CCR1016
CCR1036
CCR1072
CRS109 (new)
CRS112 (new)
CRS125 (new)
RB411 (new)
RB450 (new)
RB750 (new)
RB911 (new)
RB921 (new)
RB941 (new)
RB951 (new)
RB952 (new)
RB960 (new)
RB962 (new)
RB1100 (new)
RB1200 (new)
RB2011 (new)
RB3011 (new)
RB Groove (new)
RB Omnitik (new)
STX5 (new)

Netgear Devices:
DG834 (new)
DGN1000 (new)
DGN2200
DGN3500 (new)
FVS318N (new)
MBRN3000 (new)
R6400
R7000
R8000
WNR1000
WNR2000
WNR2200 (new)
WNR4000 (new)
WNDR3700 (new)
WNDR4000 (new)
WNDR4300 (new)
WNDR4300-TN (new)
UTM50 (new)

QNAP Devices:
TS251
TS439 Pro
Other QNAP NAS devices running QTS software

TP-Link Devices:
R600VPN
TL-WR741ND (new)
TL-WR841N (new)

Ubiquiti Devices:
NSM2 (new)
PBE M5 (new)

Upvel Devices:
Unknown Models* (new)

ZTE Devices:
ZXHN H108N (new)

Here are some general tips about how to better harden your IoT security:

Ensure all default passwords are changed to strong passwords.
Make sure all your devices have the latest security updates and patches on a daily basis.
Always set passwords to new devices and routers. Do not use the default passwords these devices come with.
Keep in mind that every device that connects to the internet has the possibility of being hacked giving the hackers access to your entire network. Make sure every connected device you purchase also comes with some type of security.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ _builder_version=”3.4.1″ background_color=”#ebebeb” border_radii=”|||140px|140px” custom_padding=”0px|0px|0px|0px” custom_css_after=”display: block;||position: absolute;||content: ”;||width: 100px;||height: 100px;||bottom: -50px;||left: 50%;||margin-left: -50px;||-ms-transform: rotate(45deg);||-webkit-transform: rotate(45deg);||transform: rotate(45deg);||z-index: 1;||” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row make_fullwidth=”on” custom_padding=”38px|0px|28px|0px” _builder_version=”3.0.95″][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.97″ text_font=”||||||||” ul_font=”||||||||” header_font=”||||||||” header_text_align=”center” header_text_shadow_style=”preset5″]

Reach out to an MDS expert now and we will get back to you shortly!

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ _builder_version=”3.0.97″ custom_padding=”0px|0px|0px|0px” prev_background_color=”#ebebeb” next_background_color=”#2d3743″][et_pb_row make_fullwidth=”on” custom_padding=”0px|0px|0px|0px” _builder_version=”3.0.97″ module_alignment=”center”][et_pb_column type=”4_4″][et_pb_code _builder_version=”3.0.97″ text_orientation=”center” module_alignment=”right”]<iframe src=”https://www.mdsny.com/test3.html” allowtransparency=”true” width=”100%” height=”650px” type=”text/html” frameborder=”0″ style=”border:0″></iframe>[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ _builder_version=”3.0.106″ background_color=”#2d3743″ custom_margin=”|||” custom_padding=”15px|0px|0px|0px|false|false” prev_background_color=”#ffffff” global_module=”123120″][et_pb_row global_parent=”123120″ make_fullwidth=”on” custom_padding=”15px|0px|0px|0px|false|false” _builder_version=”3.3.1″ module_alignment=”center”][et_pb_column type=”1_2″][et_pb_text global_parent=”123120″ _builder_version=”3.3.1″ text_font=”||||||||” text_font_size=”12px” text_line_height=”1.6em” header_font=”||||||||” header_2_font=”||||||||” background_layout=”dark”]

About MDS

Updating your IT Infrastructure doesn’t have to be a do-it-yourself project. 

With MDS, you can focus on growing your business while we take care of the technology. Our engineers go beyond standard canned offerings by creating end-to-end project solutions tailored to fit your organization’s specific needs. 

MDS experts are available 24/7 and have a wide range of skills that allow you to harness the power of a large IT team, without the overhead.

 

[/et_pb_text][et_pb_code admin_label=”Cookie Settings Button” global_parent=”123120″ _builder_version=”3.3.1″]<!– OneTrust Cookies Settings button start –><!– [et_pb_line_break_holder] –><a class=”optanon-toggle-display”>Cookie Settings</a><!– [et_pb_line_break_holder] –><!– OneTrust Cookies Settings button end –>[/et_pb_code][et_pb_social_media_follow global_parent=”123120″ _builder_version=”3.0.106″ /][et_pb_social_media_follow global_parent=”123120″ _builder_version=”3.3.1″][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/maureendatasys?lang=en” _builder_version=”3.0.105″ follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/MaureenData/” _builder_version=”3.0.105″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/maureen-data-systems” _builder_version=”3.0.105″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][/et_pb_social_media_follow][/et_pb_column][et_pb_column type=”1_4″][et_pb_text global_parent=”123120″ _builder_version=”3.4.1″ text_font=”||||||||” text_line_height=”1.4em” background_layout=”dark”]

Upcoming Events

June 14, 2018 – NYC                                    Make Technology Your “Beach”

June 27, 2018 – NYC
Do More than Skim the Surface of Office 365 [CIE]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″][et_pb_text global_parent=”123120″ _builder_version=”3.0.105″ text_font=”||||||||” text_line_height=”1.4em” background_layout=”dark”]

Contact Us

NYC Headquarters
307 W. 38th Street, Suite 1801
New York, NY 10018

Tel
646-744-1000
Email: 
contactus@mdsny.com

NYC | FL | TX | PR

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]