Cisco Talos VPN Filter malware findings

Created:  08 Jun 2018
Updated:  08 Jun 2018
NCSC statement on Cisco Talos VPN Filter malware

Further to research published last month about malware compromising small office and home office (SOHO) routers worldwide, Cisco Talos have updated their findings about the VPN Filter malware.

The Talos Blog provides a list of updated indicators of compromises (IOCs) and affected devices. At present, the malware is known to affect some equipment from the manufacturers below. The security research community is currently still investigating the malware and future updates to this list are possible:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • Mikrotik
  • Netgear
  • QNAP
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you have purchased one of the affected devices from one of the above manufacturers, the NCSC recommend you make sure it is running the latest software. Refer to your manufacturer’s instructions to update and secure your device.

Regardless of the model, this is a good opportunity to check your router software is up-to-date, and check the manufacturer’s website for updates.

Was this news helpful?

We need your feedback to improve this content.

Yes No