VPNFilter Malware

Document created by shaw-james on Jun 1, 2018Last modified by shaw-james on Jun 18, 2018
Version 2Show Document
  • View in full screen mode

In May 2018, it was widely reported by news outlets and law enforcement officials that a newly-discovered malware, VPNFilter, was threatening to compromise Internet routers and Network Attached Storage devices, including devices from Netgear, Linksys, Mikrotik, QNAP, and TP-Link.


This issue may affect a very small number of Shaw Internet customers who are using the Netgear R6400 or WNDR3700 routers because of their unique network delivery requirements.


No other routers provided through Shaw have demonstrated vulnerability to the malware.


If you have a Netgear R6400 or WNDR3700 device in your home or office, please follow the steps below to reduce the likelihood of your router being compromised while manufacturers work to provide a permanent solution.


1) Reboot the router immediately

2) Follow the steps outlined on the Netgear support website. You can also contact Netgear for further support.
3) Monitor Netgear’s support site to find out when the fixed firmware is released and ensure you update the device according to the manufacturer’s instructions.


If you have a router or Network Attached Storage device that was not provided by Shaw, visit the manufacturer’s website to find out if the router is vulnerable to the malware and follow any recommended steps provided.


We will update this page with any updates that may impact the hardware we provide our customers, if applicable.