• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

FBI Says You Should Reboot Your Home Office Router to Stop Russian Malware

By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
May 26, 2018, 3:51 PM ET

The U.S. Federal Bureau of Investigation recommended in a Friday statement that “any owner of small office and home office routers” reboot the devices, hopefully reducing their exposure to a widespread malware attack linked to Russian government actors. The FBI has reportedly seized a server used to escalate the infection, making rebooting an effective way to disable it.

A Cisco cybersecurity team said on Wednesday that at least 500,000 routers in 54 countries were impacted by the malware, known as VPN Filter. The software reportedly targets consumer-level routers used in home and small offices, and is able to both monitor local traffic and even wipe the routers, destroying them and cutting users off from the internet. Routers from Linksys, Netgear, TP-Link, and MikroTik were reportedly vulnerable – though again, the FBI is recommending rebooting all small or home office routers.

Get Data Sheet, Coins2Day’s technology newsletter.

According to reporting by The Daily Beast, VPN Filter is a product of a group known by names including “Sofacy Group” and “Fancy Bear.” The same group was allegedly responsible for the hack of emails from the Democratic National Committee and the Hillary Clinton campaign in 2016, and has been strongly linked to the Russian government.

According to Ars Technica, the VPN Filter malware is “one of the few Internet-of-things infections that can survive a reboot,” because a persistent first stage of the infection can use automated remote systems to install or re-install its second or third stages.

The FBI’s seizure of one of those remote systems, hosted at the ominously-named domain ToKnowAll.com, means the attackers will likely have to use a much more labor-intensive method to re-infect devices after they’re rebooted. Rebooting will also, according to a Department of Justice statement, help the government teams “identify and remediate the infection worldwide,” apparently by tracking communications sent by infected devices after they’re rebooted.

About the Author
By David Z. Morris
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.