ARG, IncARG, IncARG, IncARG, Inc
  • Home
  • About ARG IT Clarity
    • Leadership
    • Board of Directors
    • Our Experts
    • Testimonials
    • Careers
  • Solution Areas
    • Cloud
    • SD-WAN & Connectivity
    • Unified Communications
    • Managed Security
    • Expense Management
    • Customer Experience
    • Colocation
    • Advanced IoT
    • Managed IT
  • Events
    • Events Gallery
  • Kindness
  • News
  • Resources
  • Contact Us

Linksys, NETGEAR, and Other Routers Compromised

    Home News Linksys, NETGEAR, and Other Routers Compromised
    NextPrevious
    A row of padlock icons with one red open padlock among white closed ones, symbolizing a security vulnerability in a digital context.

    Linksys, NETGEAR, and Other Routers Compromised

    By Lindsey Bronston | News, Security | Comments are Closed | 29 May, 2018 | 0

    Friday, the FBI issued an alert that hundreds of thousands of broadband routers have been infected with a malware named VPNFilter.

    Many ARG clients have installed broadband services as a backup or as primary service to their smaller locations. Immediate action is advised.

    So far, the malware has been detected on the following routers:

    Linksys Devices:
    E1200
    E2500
    WRVS4400N

    Mikrotiik Devices:
    1016
    1036
    1072

    NETGEAR Devices:
    DGN2200
    R6400
    R7000
    R8000
    WNR1000
    WNR2000

    The first immediate step the FBI recommends is to restart the router. You may have a power button on the back, or the router can be unplugged, wait for 15 seconds, then re-plug the router. Restarting the router provides a temporary interruption of the malware.

    Further steps include the following:

    1. Reset the router to its factory settings
    2. Establish a strong password
    3. Update the firmware
    4. If the router is WIFI enabled, ensure you are using WPA2
    5. Turn off remote router administration if feasible with your management framework

    Following these steps will reset your passwords and require reestablishment of devices accessing the service via WIFI.

    If you would like further information about this threat, Forbes just published a good summary. Please think of ARG as your independent security consultant. Contact your account team, call 703-734-3500, or email info@myarg.com for further details.

    No tags.

    Lindsey Bronston

    More posts by Lindsey Bronston

    NextPrevious
    • Savannah Bananas vs. Party Animals
    • Savannah Bananas vs. Party Animals
    • 06/06/25
    • Charlotte, NC
    • Fall Fest 2025: Family Fun Day
    • Fall Fest 2025: Family Fun Day
    • 10/05/25
    • Aldie, VA
  • View All Events
  • Washington DC Headquarters: (703) 770-2400
    Maryland Office: (240) 235-0080
    Northeast Office: (401) 825-4170
    Careers
    Contact Us
    Privacy Policy
    Copyright 2024 ARG, Inc.
    • Home
    • About ARG IT Clarity
      • Leadership
      • Board of Directors
      • Our Experts
      • Testimonials
      • Careers
    • Solution Areas
      • Cloud
      • SD-WAN & Connectivity
      • Unified Communications
      • Managed Security
      • Expense Management
      • Customer Experience
      • Colocation
      • Advanced IoT
      • Managed IT
    • Events
      • Events Gallery
    • Kindness
    • News
    • Resources
    • Contact Us
    ARG, Inc