The now-notorious Russian VPNFilter malware, designed to infect several dozen models of home Wi-Fi routers and network-attached storage drives, shows no sign of slowing down. But there's now a test to see whether your router might be infected.
- Discover today's very best VPN providers
The simple browser-based test, called VPNFilter Check, was developed by antivirus maker Symantec and is on the Symantec website at http://www.symantec.com/filtercheck/ (opens in new tab). All you need to do is to browse to that site and click the big green button.
One caveat: This isn't a perfect test. It checks for only one component of the VPNFilter malware, the SSLer plugin that knocks a web connection down from encrypted HTTPS to plain old unencrypted HTTP. Other components of the multi-part malware could still be present on your router.
But if your connection does test positive, then you'll definitely need to factory-reset your router, as detailed in our previous article on VPNFilter. We're reproducing the list of routers known to be affected below.
Not all of these devices are sold in North America:
Asus support page (opens in new tab)
Unofficial reset instructions; we couldn't find the firmware
Linksys support page (opens in new tab)
MikroTik RB Groove
MikroTik RB Omnitik
Netgear support page (opens in new tab)
QNAP TS439 Pro
Other QNAP NAS devices running QTS software
Ubiquiti PBE M5
Upvel -- unknown models
ZTE Devices ZXHN H108N