cancel
Showing results for 
Search instead for 
Did you mean: 

VPNFilter Malware

Highlighted
Executive Member

VPNFilter Malware

Hi there,

 

there are a bunch of news about the recently discovered 'vpnfilter malware' affecting many routers.

Is Sense potentially affected by this type of malware and which security features/mechanisms included in Sense prevents infiltration of this type of malware?

 

Cheers!

 

 

1 ACCEPTED SOLUTION

Accepted Solutions
Community Manager

Re: VPNFilter Malware

Hello Everyone,

 

VPNFilter is a very sophisticated malware that seems to be designed in part, to target networking devices, to communicate with and control industrial hardware those in factories and warehouses. Though infections have been reportedly detected in 54 countries, the malware mainly targets Ukraine.

The initial infection vector is still investigated by the researches so the best protection strategies are still to be determined. See more details about the malware on the blog of the original reporter at: https://blog.talosintelligence.com/2018/05/VPNFilter.html
Also see: https://en.wikipedia.org/wiki/VPNFilter
 
The devices at risk are listed under the sources above, we recommend users to check their home network setup against those lists. Please note that if you have a device at risk upstream from SENSE, then SENSE is unable to possibly protect you.
 
In general, a few recommended practices for your home router:
 
•    Keep your home router’s firmware up to date.
In your SENSE router, this is automatic and your SENSE router is always up to date as long as it’s connected to the internet.
 
•    Change the default admin credentials in your home router.
In SENSE, you access your router via a securely paired app and there is no web administration interface at all.
 
•    Disable remote administration of your home router.
In SENSE, there is no web administration interface at all, neither local nor remote.
 
In addition, we recommend to follow the security advisories by the vendors of the affected routers and storage devices as follows:
 
Linksys : https://community.linksys.com/t5/Wireless-Routers/VPNFilter-Malware-Update/td-p/1315372
 
MicroTiK: https://forum.mikrotik.com/viewtopic.php?t=134776
 
Netgear: https://kb.netgear.com/000058814/Security-Advisory-for-VPNFilter-Malware-on-Some-Routers
 
QNAP: https://www.qnap.com/en-us/security-advisory/NAS-201805-24
 
TP-Link: https://www.tp-link.com/us/faq-2212.html

Has somebody helped you? Say thanks by giving likes. Has your issue been solved? Mark the post using "Accept As Solution" button to let others know.
4 REPLIES 4
Executive Member

Re: VPNFilter Malware

In addition: What if my modem in front of Sense is affected. Can Sense still protect my traffic?

emf
Scholar

Re: VPNFilter Malware

Well,

 

Difficult question. VPNFilter seems to be a router malware and hopefully it does not affect your modem.

However, if modem has malware it will get all the traffic anyway and Sense does not protect you in that case.

Executive Member

Re: VPNFilter Malware

Since I can deactivate 'router functionality' and just use a device as a 'modem' it would be interesting to know how Sense protects these devices. Not sure if Sense PPPOE is supported in Germany so no modem in front of Sense is needed?

Community Manager

Re: VPNFilter Malware

Hello Everyone,

 

VPNFilter is a very sophisticated malware that seems to be designed in part, to target networking devices, to communicate with and control industrial hardware those in factories and warehouses. Though infections have been reportedly detected in 54 countries, the malware mainly targets Ukraine.

The initial infection vector is still investigated by the researches so the best protection strategies are still to be determined. See more details about the malware on the blog of the original reporter at: https://blog.talosintelligence.com/2018/05/VPNFilter.html
Also see: https://en.wikipedia.org/wiki/VPNFilter
 
The devices at risk are listed under the sources above, we recommend users to check their home network setup against those lists. Please note that if you have a device at risk upstream from SENSE, then SENSE is unable to possibly protect you.
 
In general, a few recommended practices for your home router:
 
•    Keep your home router’s firmware up to date.
In your SENSE router, this is automatic and your SENSE router is always up to date as long as it’s connected to the internet.
 
•    Change the default admin credentials in your home router.
In SENSE, you access your router via a securely paired app and there is no web administration interface at all.
 
•    Disable remote administration of your home router.
In SENSE, there is no web administration interface at all, neither local nor remote.
 
In addition, we recommend to follow the security advisories by the vendors of the affected routers and storage devices as follows:
 
Linksys : https://community.linksys.com/t5/Wireless-Routers/VPNFilter-Malware-Update/td-p/1315372
 
MicroTiK: https://forum.mikrotik.com/viewtopic.php?t=134776
 
Netgear: https://kb.netgear.com/000058814/Security-Advisory-for-VPNFilter-Malware-on-Some-Routers
 
QNAP: https://www.qnap.com/en-us/security-advisory/NAS-201805-24
 
TP-Link: https://www.tp-link.com/us/faq-2212.html

Has somebody helped you? Say thanks by giving likes. Has your issue been solved? Mark the post using "Accept As Solution" button to let others know.