Promeneur
•
2 messages
malware system VPNFilter sur les modems VOO ?
question pour VOO
voir message attaché de security manager de ma societe
il semblerait que les routeurs de voo Netgear soient concernes par ce malware routeur
est ce que le Firmware est a jour de vos routeurs
-----------------------------------------------------------------------------------------------------------
From: David M. Slade, Chief Information Security Officer
Sent: jeudi 31 mai 2018 14:00
To: Sandrin, Gilbert
Subject: Security Bulletin: Reboot your home internet router
GLOBAL INFORMATION SECURITY
SECURITY BULLETIN
Reboot your home internet
router
A sophisticated new malware system, dubbed VPNFilter, has
reportedly affected more than 500,000 home internet
routers in over 50 countries around the world.
We wanted to make you aware of this request issued by the US Federal
Bureau of Investigation (FBI): restart your home internet router as soon as
possible to reduce your risk of exposure to this malicious software.
WHAT IS VPNFILTER?
Unlike malware that affects single operating systems (e.g., Windows,
MacOS, iOS, Android, etc.), VPNFilter targets Small Office Home
Office (SOHO) network routers, allowing hackers to potentially steal
personal information or shut off internet access.
WHAT DO YOU NEED TO DO?
SOHO network routers from prominent vendors such as Linksys,
Netgear, D-Link, MikroTik, and TP-Link (among others) have been
found to be vulnerable to this malware. According to the FBI, the
simplest thing you can do is to power off and restart your home
internet router. If your router has been compromised, restarting it
will clear the malware from memory. In general, it’s a best practice to
leave the power off for approximately 30 seconds before restarting
your router.
The FBI also suggests that you make sure your router’s firmware is
up to date. Given the technical nature of this process, we
recommend that you consult your device’s reference material or
contact the manufacturer.
Many colleagues connect remotely to Marsh & McLennan’s network,
so it’s important that you take action to keep your router and other
home devices secure.
Cyber risks are becoming more complex and attacks more
frequent. We urge you to take these precautions with your
home network as soon as possible.
David M. Slade
Chief Information Security Officer
More information about VPNFilter is available in this recent article
in the New York Times, the FBI’s Bulletin and a detailed technical
study performed by Cisco’s Talos threat research group.
voir message attaché de security manager de ma societe
il semblerait que les routeurs de voo Netgear soient concernes par ce malware routeur
est ce que le Firmware est a jour de vos routeurs
-----------------------------------------------------------------------------------------------------------
From: David M. Slade, Chief Information Security Officer
Sent: jeudi 31 mai 2018 14:00
To: Sandrin, Gilbert
Subject: Security Bulletin: Reboot your home internet router
GLOBAL INFORMATION SECURITY
SECURITY BULLETIN
Reboot your home internet
router
A sophisticated new malware system, dubbed VPNFilter, has
reportedly affected more than 500,000 home internet
routers in over 50 countries around the world.
We wanted to make you aware of this request issued by the US Federal
Bureau of Investigation (FBI): restart your home internet router as soon as
possible to reduce your risk of exposure to this malicious software.
WHAT IS VPNFILTER?
Unlike malware that affects single operating systems (e.g., Windows,
MacOS, iOS, Android, etc.), VPNFilter targets Small Office Home
Office (SOHO) network routers, allowing hackers to potentially steal
personal information or shut off internet access.
WHAT DO YOU NEED TO DO?
SOHO network routers from prominent vendors such as Linksys,
Netgear, D-Link, MikroTik, and TP-Link (among others) have been
found to be vulnerable to this malware. According to the FBI, the
simplest thing you can do is to power off and restart your home
internet router. If your router has been compromised, restarting it
will clear the malware from memory. In general, it’s a best practice to
leave the power off for approximately 30 seconds before restarting
your router.
The FBI also suggests that you make sure your router’s firmware is
up to date. Given the technical nature of this process, we
recommend that you consult your device’s reference material or
contact the manufacturer.
Many colleagues connect remotely to Marsh & McLennan’s network,
so it’s important that you take action to keep your router and other
home devices secure.
Cyber risks are becoming more complex and attacks more
frequent. We urge you to take these precautions with your
home network as soon as possible.
David M. Slade
Chief Information Security Officer
More information about VPNFilter is available in this recent article
in the New York Times, the FBI’s Bulletin and a detailed technical
study performed by Cisco’s Talos threat research group.
Solution acceptée
Thibault
Officiel VOO
•
5.7K messages
il y a 6 ans
Je sais que nous vous avons déjà informé en privé qu’il n’y avait aucun souci à ce sujet là.
Voici un peu plus de précision :
Tout d’abord, ce souci ne concerne que cette liste de produit Netgear.
Ensuite, la faille en question concerne les équipements basés sur un OS Linux (ce qui n’est pas le cas des Netgear 3100 et 3700).
Je peux donc à nouveau vous confirmer que nos modems sont totalement « clean » au
sujet de ce malware :)
0
gsandrin
Promeneur
•
2 messages
il y a 6 ans
0
0
roylion15
Top Expert
•
44.6K messages
il y a 6 ans
Déja on parle de certains routeurs de la marque et non de modems routeurs opérateurs.
Rien de tout cela ne dit que les modems Voo sont affectés et dans ce cas un reboot est suffisant vu que le FBI a trouvé le serveur duquel émanait ce malware et l’a mis hors circuit.
Cela affecte généralement les routeurs avec l’ administration à distance activée, chez Voo le firmware ne permet pas de le faire côté client.
Donc il ne faut pas être parano et nous attendrons éventuellement une réponse de Voo sur ce sujet
0
0
Thibault
Officiel VOO
•
5.7K messages
il y a 6 ans
Je me renseigne de mon côté auprès du service concerné. Moi ou un de mes collègues reviendront vers vous rapidement.
0