Results 1 to 6 of 6

Thread: Is your router safe?

  1. #1
    LSemmens
    lsemmens's Avatar
    Join Date
    Dec 2011
    Location
    Rural South OZ
    Posts
    10,585
    Thanks
    11,867
    Thanked 7,061 Times in 3,338 Posts
    Rep Power
    3153
    Reputation
    132592

    Default Is your router safe?

    Stay safe out there in computerland, people
    I'm out of my mind, but feel free to leave a message...

  2. The Following 4 Users Say Thank You to lsemmens For This Useful Post:

    DB44 (25-05-18),OSIRUS (26-05-18),Tiny (25-05-18),tristen (25-05-18)



Look Here ->
  • #2
    Premium Member
    Al Bundy's Avatar
    Join Date
    Jan 2008
    Location
    Tazzie
    Posts
    4,479
    Thanks
    2,005
    Thanked 5,193 Times in 1,905 Posts
    Rep Power
    2204
    Reputation
    92850

    Default

    From the article, list of targeted devices;
    Symantec Wednesday that identified the targeted devices as:
    • Linksys E1200
    • Linksys E2500
    • Linksys WRVS4400N
    • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
    • Netgear DGN2200
    • Netgear R6400
    • Netgear R7000
    • Netgear R8000
    • Netgear WNR1000
    • Netgear WNR2000
    • QNAP TS251
    • QNAP TS439 Pro
    • Other QNAP NAS devices running QTS software
    • TP-Link R600VPN

    Both Cisco and Symantec are advising users of any of these devices to do a factory reset, a process that typically involves holding down a button in the back for five to 10 seconds.
    Cheers
    Ted (Al)

  • #3
    Premium Member
    hoe's Avatar
    Join Date
    Jan 2008
    Age
    60
    Posts
    6,367
    Thanks
    266
    Thanked 4,596 Times in 1,948 Posts
    Rep Power
    1820
    Reputation
    70528

    Default

    Qnap have already released an updated firmware to block the exploit....



    Sent from my CLT-L29 using Tapatalk

  • The Following User Says Thank You to hoe For This Useful Post:

    Al Bundy (25-05-18)

  • #4
    Senior Member
    fandtm666's Avatar
    Join Date
    Jan 2008
    Posts
    5,502
    Thanks
    244
    Thanked 990 Times in 465 Posts
    Rep Power
    1189
    Reputation
    40447

    Default

    they are not the only ones targeted , the asus have also been targeted
    in the past .When i check mine it will have at least 15-20 hits a day trying to get in
    the backdoor.

    The thing is if yours has the firewall etc then utilise it
    mine has aiprotection working in conjunction with TREND MICRO
    and is a real time monitor not just for the modem but also
    connected computers etc.


  • The Following User Says Thank You to fandtm666 For This Useful Post:

    OSIRUS (26-05-18)

  • #5
    Senior Member

    Join Date
    Apr 2011
    Location
    Gold Coast
    Posts
    1,504
    Thanks
    1,879
    Thanked 1,590 Times in 726 Posts
    Rep Power
    767
    Reputation
    27988

    Default

    Apparently QNAP patched the firmware a while ago. And they have a malware removal tool which can be setup to scan daily. My ASUS router logs also show many attempts to connect via a backdoor. We do need to keep an eye on these things. One thing this highlights is that Linux is not immune to these sorts of attacks. Yes, it is more secure than Windows, but it is far from invulnerable.

  • The Following User Says Thank You to DB44 For This Useful Post:

    lsemmens (26-05-18)

  • #6
    LSemmens
    lsemmens's Avatar
    Join Date
    Dec 2011
    Location
    Rural South OZ
    Posts
    10,585
    Thanks
    11,867
    Thanked 7,061 Times in 3,338 Posts
    Rep Power
    3153
    Reputation
    132592

    Default

    One thing this highlights is that Linux is not immune to these sorts of attacks. Yes, it is more secure than Windows, but it is far from invulnerable.
    Exactly! I found this on my Linux forum and thought it appropriate to post here.
    I'm out of my mind, but feel free to leave a message...

  • Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •