You probably don't think about the security of your business' wifi router very often. But an urgent warning from the U.S. government shows you should act now to beef up your router's security.

The Federal Bureau of Investigation recently announced that foreign cyber-criminals are hacking and placing malware on wifi routers of individuals and small businesses within the United States.

The size and scope of the infrastructure impacted by this malware attack (VPNFilter) are significant. VPNFilter is able to make small office and home office routers inoperable. The malware can also collect all information passing through the router. Dozens of home and commercial grade routers are impacted by this malware attack.

The following are currently known to be vulnerable:

  • Asus RT-AC66U (new)
  • Asus RT-N10 (new)
  • Asus RT-N10E (new)
  • Asus RT-N10U (new)
  • Asus RT-N56U (new)
  • Asus RT-N66U (new)
  • D-Link DES-1210-08P (new)
  • D-Link DIR-300 (new)
  • D-Link DIR-300A (new)
  • D-Link DSR-250N (new)
  • D-Link DSR-500N (new)
  • D-Link DSR-1000 (new)
  • D-Link DSR-1000N (new)
  • Huawei HG8245 (new)
  • Linksys E1200
  • Linksys E2500
  • Linksys E3000 (new)
  • Linksys E3200 (new)
  • Linksys E4200 (new)
  • Linksys RV082 (new)
  • Linksys WRVS4400N
  • MikroTik CCR1009 (new)
  • MikroTik CCR1016
  • MikroTik CCR1036
  • MikroTik CCR1072
  • MikroTik CRS109 (new)
  • MikroTik CRS112 (new)
  • MikroTik CRS125 (new)
  • MikroTik RB411 (new)
  • MikroTik RB450 (new)
  • MikroTik RB750 (new)
  • MikroTik RB911 (new)
  • MikroTik RB921 (new)
  • MikroTik RB941 (new)
  • MikroTik RB951 (new)
  • MikroTik RB952 (new)
  • MikroTik RB960 (new)
  • MikroTik RB962 (new)
  • MikroTik RB1100 (new)
  • MikroTik RB1200 (new)
  • MikroTik RB2011 (new)
  • MikroTik RB3011 (new)
  • MikroTik RB Groove (new)
  • MikroTik RB Omnitik (new)
  • MikroTik STX5 (new)
  • Netgear DG834 (new)
  • Netgear DGN1000 (new)
  • Netgear DGN2200
  • Netgear DGN3500 (new)
  • Netgear FVS318N (new)
  • Netgear MBRN3000 (new)
  • Netgear R6400
  • Netgear R7000
  • Netgear R8000
  • Netgear WNR1000
  • Netgear WNR2000
  • Netgear WNR2200 (new)
  • Netgear WNR4000 (new)
  • Netgear WNDR3700 (new)
  • Netgear WNDR4000 (new)
  • Netgear WNDR4300 (new)
  • Netgear WNDR4300-TN (new)
  • Netgear UTM50 (new)
  • QNAP TS251
  • QNAP TS439 Pro
  • Other QNAP NAS devices running QTS software
  • TP-Link R600VPN
  • TP-Link TL-WR741ND (new)
  • TP-Link TL-WR841N (new)
  • Ubiquiti NSM2 (new)
  • Ubiquiti PBE M5 (new)
  • Upvel Devices -unknown models (new)
  • ZTE Devices ZXHN H108N (new)

How to Protect Your Router from Attack

Immediately after reading this blog, we encourage you to check the make and model number of any wifi router you may use in your home or business. If you find a match, please undergo the following simple steps to stop the VPNFilter attack.

Simply reboot your router by turning it off for at least 10 seconds. Power it back on and you should be protected. However, to ensure total safety you may wish to reset your router to factory default settings. Most routers are equipped with a factory reset button that will wipe out any stored data and update security settings.

If you do not use one of the routers listed above, you may still wish to undergo this procedure to make sure your router is updated with the latest security protocols.

About Managed IT Services Provider BKS Systems.

Founded in 2000, BKS Systems is a leading provider of managed IT services in the Chicago area. Our staff of certified IT professionals can help you and your small business deal with the threats of malware attacks like VPNFilter and beyond.

If your small business is not actively monitoring threats to its hardware and software systems, you are putting both employee and customer data at risk. Contact the professionals at BKS Systems today to discuss developing a technology security plan for your business.