According to the United States Computer Emergency Readiness Team (US-CERT), a form of malware, called VPNFilter, targets Small Office/Home Office routers (source).
This malware has the potential to collect network traffic details; such as login credentials. After gaining access to systems on the network, the software infects systems with malware, and disables Internet access.
The TTU IT Division and US-CERT recommend the following steps to protect yourself and your information resources from this malware:
- Reboot your router to temporarily disrupt the malware and aid in the identification of potentially infected devices. To reboot your router, simply unplug from the power source, wait 30 seconds, and then reconnect the router to the power;
- Set a secure password for your router. Many routers come with a preset password, that a hacker may be able to guess. Setting your own secure password will help reduce the risk of hackers gaining access to your router;
- Do not click on links contained within an email, unless you are certain of the sender's identity and expecting the information;
- Do not open attachments, unless you are certain of the sender's identity and expecting the information;
- Delete and do not reply to any suspicious or suspect emails;
- Update your desktop, laptop, and/or mobile device anti-virus software; and
- Keep current on critical system and third-party software updates:
- Windows Users: https://support.microsoft.com/en-us/help/12373/windows-update-faq
- Mac Users: https://support.apple.com/en-us/HT201541
US-CERT has provided additional steps for securing your home/small office network at https://www.us-cert.gov/ncas/tips/ST15-002.