The Federal Bureau of Investigation has issued a public announcement advising consumers to reboot their home and office routers after discovering a massive malware attack.
The malware, now called "VPNFilter," has reportedly infected at least 500,000 routers from several manufacturers. “VPNFilter is able to render small office and home office routers inoperable. The malware can potentially also collect information passing through the router,” the FBI said in its public warning (via Forbes).
VPNFilter malware was found in small office and home office routers. After a series of investigation with help from Cisco’s Talos intelligence organization, the bureau determined that the routers infected were manufactured by Linksys, MikroTik, Netgear, and TP-Link. The malware was also found on QNAP cloud storage devices and services.
Security researchers involved in the VPNFilter investigation found that it operates in multiple stages. Of the three known stages of the attack, only stage 1 is believed to be immune to a reboot since it relies on a domain that sends back needed data for stages 2 and 3 everytime an infected router restarts.
Notably, though, the identified web domain ToKnowItAll.com — reportedly operated by Russian hackers Sofacy Group — used for VPNFilter’s stage 1 was seized by the FBI last Wednesday through a court-ordered warrant. So it is now being assumed that the source for stages 2 and 3 has been shut down.
Without the domain repeatedly sending back data for the attack, stages 2 and 3 can be prevented, presumably by performing reboots on affected home and office routers.
On the other hand, there is also a possibility that the attackers have installed other internet domains to deliver sources for stages 2 and 3 of the attack. However, the same Forbes report suggested that rebooting a router temporarily avoids the VPNFilter from causing severe damages.
Talos also said in their report, which was released on the same day that ToKnowItAll.com was seized, that the VPNFilter spread is most likely a state-sponsored attack. While the malware was found on routers across 54 countries, Talos researchers found that the attackers dedicated a command and control facility solely for attacking Ukraine-based targets “at an alarming rate.”


Golden Dome Missile Defense: Anduril and Palantir Join Forces on Trump's $185B Space Shield
SpaceX IPO Filing Expected This Week as Valuation Could Surpass $75 Billion
NVIDIA's Feynman AI Chip May Face Redesign Amid TSMC Capacity Crunch
Elon Musk Announces Terafab: SpaceX and Tesla to Build Dual AI Chip Factories in Austin, Texas
Rubio Directs U.S. Diplomats to Use X and Military Psyops to Counter Foreign Propaganda
California's AI Executive Order Pushes Responsible Tech Use in State Contracts
Nanya Technology Shares Surge 10% After $2.5 Billion Private Placement from Sandisk and Cisco
AWS Bahrain Region Disrupted by Drone Activity Amid Middle East Conflict
SMIC Allegedly Supplies Chipmaking Tools to Iran's Military, U.S. Officials Warn
Chinese Universities with PLA Ties Found Purchasing Restricted U.S. AI Chips Through Super Micro Servers
Elliott Investment Management Takes Multibillion-Dollar Stake in Synopsys
Palantir's Maven AI Earns Pentagon "Program of Record" Status, Reshaping Military AI Strategy
Nintendo Switch 2 Production Cut as Holiday Sales Miss Targets
OpenAI Pulls the Plug on Sora, Ending $1 Billion Disney Partnership
NASA Artemis II: First Crewed Moon Mission Since Apollo Takes Four Astronauts on 10-Day Lunar Journey
TSMC Japan's Second Fab to Produce 3nm Chips by 2028
Meta Ties Executive Pay to Aggressive Stock Price Targets in Major Retention Push 



