Security researchers from the Institute Internet Storm Center , last week , managed to identify the malware program that can replicate itself that attacked the authentication process in the Linksys brand routers .
The worm , named " The Moon " is targeting flaws contained in a CGI script that is part of the administrator interface possessed diverse Linksys E - Series routers .
Quoted from PC World , Thursday ( 02/20/2014 ) , the Linksys router models are vulnerable to this worm attacks , among others, E4200 , E3200 , E3000 , E2500 , E2100L , E2000 , E1550 , E1500 , E1200 , E1000 , E900 , E300 , WAG320N , WAP300N , WAP610N , WES610N , WET610N , WRT610N , WRT600N , WRT400N , WRT320N , WRT160N , and WRT150N .
Meanwhile , Belkin , owner of the company also said that some Linksys Wireless - N router they also affected. However , Belkin did not specify in detail what the series is being targeted .
Director of Global Communications, Belkin , Karen Sohl said , " Linksys is aware of the malware attack called " The Moon " who attacked some of the Linksys E-Series routers long , and the access point and router Wireless - N . "
Added by Sohl , the malware only attacks the authentication process only if the Remote Management Access feature is enabled .
" Linksys router market with the Remote Management Access feature is not active by default , " said Sohl .
To remove the malware , Sohl recommend that users reboot their routers .
On the official website , Linksys also has made a guide on how to cope with the malware attacks . The guide can be viewed through the following link .
Linksys will follow this attack with improved firmware that will soon be available on our website the next few weeks , "said Sohl .