Stay safe out there in computerland, people
I'm out of my mind, but feel free to leave a message...
Look Here -> |
From the article, list of targeted devices;
Symantec Wednesday that identified the targeted devices as:
- Linksys E1200
- Linksys E2500
- Linksys WRVS4400N
- Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
- Netgear DGN2200
- Netgear R6400
- Netgear R7000
- Netgear R8000
- Netgear WNR1000
- Netgear WNR2000
- QNAP TS251
- QNAP TS439 Pro
- Other QNAP NAS devices running QTS software
- TP-Link R600VPN
Both Cisco and Symantec are advising users of any of these devices to do a factory reset, a process that typically involves holding down a button in the back for five to 10 seconds.
Cheers
Ted (Al)
Qnap have already released an updated firmware to block the exploit....
Sent from my CLT-L29 using Tapatalk
Al Bundy (25-05-18)
they are not the only ones targeted , the asus have also been targeted
in the past .When i check mine it will have at least 15-20 hits a day trying to get in
the backdoor.
The thing is if yours has the firewall etc then utilise it
mine has aiprotection working in conjunction with TREND MICRO
and is a real time monitor not just for the modem but also
connected computers etc.
OSIRUS (26-05-18)
Apparently QNAP patched the firmware a while ago. And they have a malware removal tool which can be setup to scan daily. My ASUS router logs also show many attempts to connect via a backdoor. We do need to keep an eye on these things. One thing this highlights is that Linux is not immune to these sorts of attacks. Yes, it is more secure than Windows, but it is far from invulnerable.
lsemmens (26-05-18)
Exactly! I found this on my Linux forum and thought it appropriate to post here.One thing this highlights is that Linux is not immune to these sorts of attacks. Yes, it is more secure than Windows, but it is far from invulnerable.
I'm out of my mind, but feel free to leave a message...
Bookmarks