<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Filter Malware in ONTAP Hardware</title>
    <link>https://community.netapp.com/t5/ONTAP-Hardware/VPN-Filter-Malware/m-p/140564#M8840</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is nothing in anything I've seen to suggest NetApp devices might be vulnerable to this, no. Initial information suggests it is only an issue for NAS systems from another company. ONTAP does not share code from this platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The initial information (in your linked posts) suggest this is installed by exploiting default credentials, which are generally not present on NetApp systems, and directly connected to the internet, which NetApp systems are not commonly.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 May 2018 07:54:41 GMT</pubDate>
    <dc:creator>AlexDawson</dc:creator>
    <dc:date>2018-05-29T07:54:41Z</dc:date>
    <item>
      <title>VPN Filter Malware</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/VPN-Filter-Malware/m-p/140561#M8839</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has there been any offical statement to confirm if NetApp is vulnerable to the&amp;nbsp;VPN Filter Malware which we know affects Cisco and Qnap routers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information can be found&amp;nbsp;&lt;A href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/router-fbi-security-russian-malware-vpnfilter-advice-what-to-do-a8372911.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;A href="https://thehackernews.com/2018/05/vpnfilter-botnet-malware.html" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;N Potts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 13:40:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/VPN-Filter-Malware/m-p/140561#M8839</guid>
      <dc:creator>npotts001</dc:creator>
      <dc:date>2025-06-04T13:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Filter Malware</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/VPN-Filter-Malware/m-p/140564#M8840</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is nothing in anything I've seen to suggest NetApp devices might be vulnerable to this, no. Initial information suggests it is only an issue for NAS systems from another company. ONTAP does not share code from this platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The initial information (in your linked posts) suggest this is installed by exploiting default credentials, which are generally not present on NetApp systems, and directly connected to the internet, which NetApp systems are not commonly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 07:54:41 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/VPN-Filter-Malware/m-p/140564#M8840</guid>
      <dc:creator>AlexDawson</dc:creator>
      <dc:date>2018-05-29T07:54:41Z</dc:date>
    </item>
  </channel>
</rss>

