253.777.0763    Get SUPPORT

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Graemouse Technologies’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Holiday Specifications Flash Meetings IT Support Botnet Data Protection Internet exploMicrosoft Security Productivity Document Management Cybercrime Virtualization Privacy Network Security Downtime Data Backup Windows 10s Root Cause Analysis Charger Safe Mode Cloud Computing Redundancy FCC Windows Emergency Email Data Management Phishing Google Docs Office 365 Update Saving Money Backup HIPAA Communication Money Alert Business Management Human Resources Software Ransomware Upgrade Productivity Automation Best Practices Vulnerability Word Content Management Value User Error Data OneNote Employer-Employee Relationship Windows 7 Cryptocurrency Online Shopping Avoiding Downtime Managing Stress Network Operating System Bandwidth VPN Cache Cortana Windows 10 Voice over Internet Protocol Hackers Tools Cast Artificial Intelligence Keyboard Cybersecurity Public Cloud Apps Skype Smart Office Router Practices How To Business Intelligence App IT Services Spam Tip of the Week Managed IT Services Title II Business Continuity Outlook Net Neutrality Facebook Small Business Microsoft Office Workers Managed Service Provider Law Enforcement Chrome Connectivity Frequently Asked Questions User Tips FENG Inventory Business Google Drive Server Computer Computer Fan Criminal Password Data Storage Netflix Private Cloud Software Tips Hosted Computing Social Media Password Manager Spam Blocking Microsoft Excel The Internet of Things Smartphones Tech Term eWaste Government Entertainment HVAC Managed IT Business Computing Miscellaneous Bring Your Own Device Screen Mirroring Evernote Cloud Save Money Big Data Innovation Applications Computers Website Technology Internet of Things Outsourced IT Hosted Solutions Efficiency NIST Windows 10 webinar Malware Start Menu Comparison Managed IT Services Unsupported Software Data Breach Smart Tech Identity Theft Two-factor Authentication IT Management Collaboration Internet Data Recovery BYOD Communications Credit Cards Devices Advertising Telephone Systems Mobile Device Management Marketing Current Events Social Engineering Digital Signature Android Blockchain Addiction Gadgets Travel Wi-Fi Smartphone CES Google Servers Infrastructure Knowledge VoIP Mobile Devices Hardware Wireless Internet Data Security Budget Electronic Medical Records Remote Monitoring IT Plan Passwords BDR Networking Health Paperless Office Browser Legal Encryption

Newsletter Sign Up