For the latest on the VPNfilter Malware click here -->
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10085Talos Intelligence (“Talos”) recently reported that a malware known as VPNFilter could render IoT devices vulnerable. On June 5, 2018, it was disclosed that the following D-Link products might be affected:
· DES-1210-08P
· DIR-300 (non-USA)
· DIR-300A (non-USA)
· DSR-250N
· DSR-500N
· DSR-1000 (non-USA)
· DSR-1000N (non-USA)
While D-Link appreciates Talos for making the above disclosure and is taking this report seriously, we did not receive enough details from the disclosure to identify which hardware revision or firmware of the products could be affected. Therefore, immediately upon learning of the first report by Talos, D-Link began diligently investigating the nature of the malware and its potential threats to our customers. The best intelligence we currently have is that the VPNFilter malware may attempt to use known vulnerabilities/exploits to attack a device.
To help protect your devices from the VPNFilter malware, please make sure that your devices are completely updated with the latest firmware. We recommend users update their firmware to the latest version, reset their devices to the factory default, and then complete the installation/setup steps.
We strongly encourage owners/users of D-Link products to frequently check for device firmware updates at the D-Link Support website.
For end-of-life devices DIR-300 A1 and DIR-300Bx, we recommend that the owners contact their local regional distributors for alternate solutions.