
by Kyle Perisic
NEW YORK – The FBI issued a warning Friday to Americans with internet routers in their homes or offices to reboot their routers immediately after the agency discover hundreds of thousands of routers had been compromised by foreign actors.
“The FBI recommends any owner of small office and home office routers power cycle (reboot) the devices,” the warning said. “Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide.”
“The size and scope of the infrastructure impacted by VPNFilter malware is significant,” the agency said. More than 500,000 routers have been infected, The Daily Beast reported on Wednesday.
TA18-145A: Cyber Actors Target Home and Office Routers and Networked Devices Worldwide https://t.co/oAfaFP7OeN
— US-CERT (@USCERT_gov) May 25, 2018
VPNFilter is malware intended for internet routers that can steal data and has a “kill switch” designed to destroy the infected router on command and “render small office and home office routers inoperable.” The FBI says that the “initial infection vector for this malware is currently unknown.”
The FBI added that “actors used VPNFilter malware to target small office and home office routers” and that “the malware is able to perform multiple functions, including possible information collection, device exploitation, and blocking network traffic.”
The Daily Beast report said that the hackers behind the VPNFilter are linked to a Russian hacking group called Fancy Bear and used the same malware to hack the Democratic National Committee during the 2016 presidential campaign.
#FBI recommends any owner of small office & home office routers reboot the devices to temporarily disrupt the malware of infected devices https://t.co/VOSz0fBYaF pic.twitter.com/YzVolfuI2w
— FBI (@FBI) May 25, 2018
“The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices,” the warning continued. “Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware.”
Follow Kyle on Twitter @KylePerisic
Disclaimer: News articles on this site may contain opinions of the author, and if opinion, may not necessarily reflect the views of the site itself or the views of the owners of NewsLI.com, Long Island Media Inc., or Long Island Exchange®. For more information on our editorial policies please view our terms of service.