And their list of impacted devices: • Modems/Routers ActionTec PK5000 ASUS RT-*/GT-*/ZenWifi TP-LINK DrayTek Vigor Tenda Wireless Ruijie Zyxel USG* Ruckus Wireless VNPT iGate Mikrotik TOTOLINK IP Cameras D-LINK DCS-* Hikvision Mobotix NUUO AXIS Panasonic NVR/DVR Shenzhen TVT NVRs/DVRs NAS QNAP (TS Series) Fujitsu Synology Zyxel If you own one of the above branded pieces of equipment, check the manufacturer's website for updated firmware. If you suspect it has been compromised, a full factory reset and firmware recovery is probably the only option to ensure code remnants don't persist.
The message sounds odd as OP did not present any evidence of China Botware. Who knows, after you have done the full factory reset and firmware recovery, you might end up like what happpened in Lebanon.
I don't know enough about the interplay between firmware and hardware, but I suspect that if products are truly compromised, even loading new firmware won't solve anything. There could easily be corruption at the hardware level that super-cedes any firmware instructions. Maybe an extra chip that bypasses any software instructions and does what it wants to do anyway??
My cloud VPS where my systems run was compromised unknown to me. I checked the logs and the same IP from Russia spent a lot of time inside and even returned many months later. You don't have to be important, you could just have some money or resources that are valuable. Why do you assume only the Chinese government knows about these holes and not some other money-driven groups?
Silly question. I live in an area with tropical storms where power is lost frequently. On top of that why would I go for poor latency when I can have a server less than 100 miles from my broker? Ignoring all that, a home computer (especially MS Windows) is ever more prone to infiltration. My case was due to my own stupidity, Linux otherwise is secure.