Stay in Touch
Get sneak previews of special offers & upcoming events delivered to your inbox.
Sign in
โ05-29-2018 12:00 AM
@JustJazzmom wrote:
@goldensrbest wrote:The Russians are after all of us!!My son said unless you see it on the news,ignore it.
IDK but a NYT article sounds like news to me. SMH
And not just news, but a far better source than some random person giving an opinion, that may or may not be based in truth, on TV.
โ05-29-2018 12:07 AM
@JustJazzmom Thanks for the reminder. I read the article this morning and rebooted my router.
โ05-29-2018 12:37 AM - edited โ05-29-2018 12:40 AM
Thanks for taking time to share this, @JustJazzmom. I received the notice in an email alert from the FBI IC3. Anyone interested in receiving notices can subscribe to receive alerts from their Internet Crime Complaint Center.
"FOREIGN CYBER ACTORS TARGET HOME AND OFFICE ROUTERS AND NETWORKED DEVICES WORLDWIDE
SUMMARY
The FBI recommends any owner of small office and home office routers power cycle (reboot) the devices. Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide. The actors used VPNFilter malware to target small office and home office routers. The malware is able to perform multiple functions, including possible information collection, device exploitation, and blocking network traffic.
TECHNICAL DETAILS
The size and scope of the infrastructure impacted by VPNFilter malware is significant. The malware targets routers produced by several manufacturers and network-attached storage devices by at least one manufacturer. The initial infection vector for this malware is currently unknown.
THREAT
VPNFilter is able to render small office and home office routers inoperable. The malware can potentially also collect information passing through the router. Detection and analysis of the malwareโs network activity is complicated by its use of encryption and misattributable networks.
DEFENSE
The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices. Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware.
May 25, 2018
Alert Number
https://www.ic3.gov/media/2018/180525.aspx
โ05-29-2018 06:17 AM
My router does its own I DONT WANT TO WORK TODAY, I AM ON VACATION. Perhaps if I say "pretty please" the Russians will fix it. LOL
โ05-29-2018 06:31 AM
hanks for the heads up!!
โ05-29-2018 06:42 AM
I didn't hear about this. Thanks for the article, @JustJazzmom
Get sneak previews of special offers & upcoming events delivered to your inbox.
*You're signing up to receive QVC promotional email.
Find recent orders, do a return or exchange, create a Wish List & more.
Privacy StatementGeneral Terms of Use
QVC is not responsible for the availability, content, security, policies, or practices of the above referenced third-party linked sites nor liable for statements, claims, opinions, or representations contained therein. QVC's Privacy Statement does not apply to these third-party web sites.
ยฉ 1995-2025 QVC, Inc. All rights reserved.ย ย |ย QVC, Q and the Q logo are registered service marks of ER Marks, Inc. 888-345-5788