Router Russia FBI what now? Geeks get in here! Lawndart! Venom!

Discussion in 'General' started by Steeltoe, May 28, 2018.

  1. Steeltoe

    Steeltoe What's my move?

    Reboot my router? What if it's built into a cable modem? Wtf good is rebooting it? Is it still infected? Why haven't you jerks fixed this? Dang nerds.

    OK I rebooted it.

    What's my move?
  2. MCW

    MCW Well-Known Member

    No internet? There are typically lights to indicate status, like 1 for upstream, 1 for downstream and at least 1 which shows when it is connected. Are the lights showing anything different than they normally do?
  3. Rhino48

    Rhino48 Well-Known Member

    I ain't no Super Geek but I can't imagine any kind of malware the russkies would push that wouldn't just restart when you rebooted your router.

    Who do you trust more the Russians or the FBI...? haha....maybe.
  4. rd49

    rd49 Well-Known Member

    Ummm yeah you should keep running with that.
  5. Steeltoe

    Steeltoe What's my move?
    "FBI officials are recommending owners of routers to reboot their devices to temporarily disrupt the malware, and help with the potential identification of infected devices. In addition, router owners are advised to consider disabling remote management settings on devices, and secure with strong passwords and encryption when enabled. Also, Network devices should be upgraded to the latest available versions of firmware."
    Last edited: May 28, 2018
  6. eggfooyoung

    eggfooyoung You no eat more!

    This happens to another guy on here after he searched for gay porn. Maybe he can help you. Search @Cannoli

    Good luck!
    Steeltoe likes this.
  7. Steeltoe

    Steeltoe What's my move?

    Dangit this is serious! Or not. I really have no idea.
  8. Venom51

    Venom51 John Deere Equipment Expert

    Is your mode/router combo provided by your ISP....

    Call them and ask them if your model is affected. If so ask them if they have a plan to replace the firmware to shore up the outer facing interfaces.

    If your router isn't provided by your ISP and is on the list of known affected routers then walk to where the router is located. Remove power to the router, disconnect the cables attached to the router. Take router and walk to your closest garbage can. Toss router in can. Replace router with something that isn't designed to be operated by a 5 year old. Learn how to properly setup your new router and secure it. Keep your router firmware up to date as new OS versions are released by the vendor. If the vendor isn't releasing new firmware a couple times a year you have bought another poorly supported hunk of shit.
    Last edited: May 28, 2018
    Steeltoe likes this.
  9. vfrket

    vfrket Lost Member

    And I read this in the exact tone, cadence, and attitude of you Kenny.... lmao

    Pittenger5 likes this.
  10. SPL170db

    SPL170db Trackday winner

    I'm still running on my old school Linksys WRT54g running DD-WRT on it which doesn't appear to be on this list.....

    To date, VPNFilter is known to be capable of infecting enterprise and small office/home office routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices. These include:

    • Linksys E1200
    • Linksys E2500
    • Linksys WRVS4400N
    • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
    • Netgear DGN2200
    • Netgear R6400
    • Netgear R7000
    • Netgear R8000
    • Netgear WNR1000
    • Netgear WNR2000
    • QNAP TS251
    • QNAP TS439 Pro
    • Other QNAP NAS devices running QTS software
    • TP-Link R600VPN
    Lawn Dart likes this.
  11. assjuice cyrus

    assjuice cyrus Well-Known Member

    Setup a router?
    Secure it?
    Update firmware?

    Wtf is this shit you speak of?

    I cant keep my pc up to date, now you want me to update me router? WTF?
    crusty9r likes this.
  12. socalrider

    socalrider pathetic and rude

    can anyone link the list of known affected routers? or is the limited to the list in post #10?
  13. Lawn Dart

    Lawn Dart Difficult. With a big D.

    Go to Home Depot and get some duct tape and plastic sheeting while you're at it.
  14. Steeltoe

    Steeltoe What's my move?

  15. eggfooyoung

    eggfooyoung You no eat more!

    Are you an Irish lad?
    assjuice cyrus likes this.
  16. Cannoli

    Cannoli Typical Uccio

    pfSense Community Edition + Fanless Appliance + Ubiquiti AC Pro and a little tech geekery will provide an incredibly secure and robust small business or home network configuration. Add the free ad blocking and GeoIP blocking offered in pfBLockerNG and Squid proxy, Snort or Suricata network intrusion detection and prevention capabilities, and openVPN or IPSEC VPN capability, and you will have a feature set that rivals $10k appliances from PaloAlto, Cisco, Barracuda, and Fortinet. All of these features are free in pfSense, as long as you have the knowledge to set things up (or the skills to google how to's).
  17. Steeltoe

    Steeltoe What's my move?

  18. Lawn Dart

    Lawn Dart Difficult. With a big D.

    Your router (if it's on the list), is still infected until you re-flash the firmware... But! Good news: the FBI took control of the domain specified in the malware... So, there's no chance of your data being hacked, stolen or monitored. :D
    Pixelator and BigBird like this.
  19. Venom51

    Venom51 John Deere Equipment Expert


    Unless the entity that pushed the malware onto your device decides it would like to send out the kill command to all the IPs that it logged. Which quite frankly if they killed your hunk of shit infected router they would just be doing the internet a favor.
    DaveB, Lawn Dart and BigBird like this.
  20. Steeltoe

    Steeltoe What's my move?

    I see what you did there.
    Lawn Dart likes this.

Share This Page