Reboot my router? What if it's built into a cable modem? Wtf good is rebooting it? Is it still infected? Why haven't you jerks fixed this? Dang nerds. OK I rebooted it. What's my move?
No internet? There are typically lights to indicate status, like 1 for upstream, 1 for downstream and at least 1 which shows when it is connected. Are the lights showing anything different than they normally do?
I ain't no Super Geek but I can't imagine any kind of malware the russkies would push that wouldn't just restart when you rebooted your router. Who do you trust more the Russians or the FBI...? haha....maybe.
https://www.ic3.gov/media/2018/180525.aspx http://www.ktvu.com/news/fbi-urging-people-to-reboot-routers-due-to-malware-threat "FBI officials are recommending owners of routers to reboot their devices to temporarily disrupt the malware, and help with the potential identification of infected devices. In addition, router owners are advised to consider disabling remote management settings on devices, and secure with strong passwords and encryption when enabled. Also, Network devices should be upgraded to the latest available versions of firmware."
This happens to another guy on here after he searched for gay porn. Maybe he can help you. Search @Cannoli Good luck!
Is your mode/router combo provided by your ISP.... Call them and ask them if your model is affected. If so ask them if they have a plan to replace the firmware to shore up the outer facing interfaces. If your router isn't provided by your ISP and is on the list of known affected routers then walk to where the router is located. Remove power to the router, disconnect the cables attached to the router. Take router and walk to your closest garbage can. Toss router in can. Replace router with something that isn't designed to be operated by a 5 year old. Learn how to properly setup your new router and secure it. Keep your router firmware up to date as new OS versions are released by the vendor. If the vendor isn't releasing new firmware a couple times a year you have bought another poorly supported hunk of shit.
I'm still running on my old school Linksys WRT54g running DD-WRT on it which doesn't appear to be on this list..... To date, VPNFilter is known to be capable of infecting enterprise and small office/home office routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices. These include: Linksys E1200 Linksys E2500 Linksys WRVS4400N Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072 Netgear DGN2200 Netgear R6400 Netgear R7000 Netgear R8000 Netgear WNR1000 Netgear WNR2000 QNAP TS251 QNAP TS439 Pro Other QNAP NAS devices running QTS software TP-Link R600VPN
Setup a router? Secure it? Update firmware? Wtf is this shit you speak of? I cant keep my pc up to date, now you want me to update me router? WTF?
pfSense Community Edition + Fanless Appliance + Ubiquiti AC Pro and a little tech geekery will provide an incredibly secure and robust small business or home network configuration. Add the free ad blocking and GeoIP blocking offered in pfBLockerNG and Squid proxy, Snort or Suricata network intrusion detection and prevention capabilities, and openVPN or IPSEC VPN capability, and you will have a feature set that rivals $10k appliances from PaloAlto, Cisco, Barracuda, and Fortinet. All of these features are free in pfSense, as long as you have the knowledge to set things up (or the skills to google how to's).
Your router (if it's on the list), is still infected until you re-flash the firmware... But! Good news: the FBI took control of the domain specified in the malware... So, there's no chance of your data being hacked, stolen or monitored.
Yet.... Unless the entity that pushed the malware onto your device decides it would like to send out the kill command to all the IPs that it logged. Which quite frankly if they killed your hunk of shit infected router they would just be doing the internet a favor.