Okay, here's whats going on.
A new type of malicious software has attacked more than 1.5 million devices. AND - It's spreading rapidly. These devices aren't computers and phones, they are home routers and network storage devices.
This issue was one of the main points David Stelzl covered in our live event last Thursday. Here's an interview we did together to help get more of this vital information out to everyone that wanted to be there but couldn't. webcast.sklartech.com
To help arrest this malware called VPNFilter, the FBI and security experts are urging device owners to reboot routers and network-attached storage devices listed at the bottom of this message.
Unfortunately, there is no way to know if your device has been infected and rebooting might not entirely fix it.
Furthermore, some of these devices designed for your home might be installed in your business today. Sometimes at a remote site or even central locations.
These "edge routers" are sometimes provided by your service provider (i.e., Comcast, Verizon, etc.) so it is easy to overlook them and in some cases assume they are correctly managed by the provider.
Cyber-thieves are banking on you not knowing about this issue so please don't ignore it, primarily if your device is listed below. Once you reset your router (put a paper clip in the reset button on the back for 10 secs), you will want to log in and reset your passwords to something other than the default.
Note that when you reset your router, you will need to know the default IP address so you can log in and change the password. Here's a link to most devices on the market.
For our faithful clients on our ProTec service program, we are here to assist if you need our help.
For more information here is a link to the article I first learned about this issue.
Stay safe out there!
List of devices:
MIKROTIK ROUTEROS VERSIONS FOR CLOUD CORE ROUTERS:
Other QNAP NAS devices running QTS software