National Cyber Security Centre
|
|
Cisco Talos VPN Filter malware findings
NCSC statement on Cisco Talos VPN Filter malware
Further to research published last month about malware compromising small office and home office (SOHO) routers worldwide, Cisco Talos have updated their findings about the VPN Filter malware.
The Talos Blog provides a list of updated indicators of compromises (IOCs) and affected devices. At present, the malware is known to affect some equipment from the manufacturers below. The security research community is currently still investigating the malware and future updates to this list are possible:
- Asus
- D-Link
- Huawei
- Linksys
- Mikrotik
- Netgear
- QNAP
- TP-Link
- Ubiquiti
- Upvel
- ZTE
If you have purchased one of the affected devices from one of the above manufacturers, the NCSC recommend you make sure it is running the latest software. Refer to your manufacturer’s instructions to update and secure your device.
Regardless of the model, this is a good opportunity to check your router software is up-to-date, and check the manufacturer’s website for updates.
Original article link: https://www.ncsc.gov.uk/news/cisco-talos-vpn-filter-malware-findings


