(707) 268-8850    Get SUPPORT

Network Management Services Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Network Management Services’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Hackers Backup VoIP Google Data Backup Mobile Devices Email Hosted Solutions Outsourced IT IT Support Data Recovery Microsoft Software Innovation Business Continuity Tech Term Cloud Computing Internet Data Internet of Things Saving Money Efficiency Small Business Ransomware Communications Cybercrime BDR Business Hardware Android Cybersecurity Disaster Recovery IT Services Communication Alert How To Server Artificial Intelligence Computers Browser Avoiding Downtime Smartphone User Tips Windows Smartphones Managed IT Phishing Mobile Device Management Two-factor Authentication Vulnerability Mobility Network Collaboration Router Money BYOD Business Management Managed IT Services Business Intelligence Save Money Data Security Data Protection Law Enforcement Social Engineering Chrome Firewall Remote Monitoring Telephone Systems Computer Operating System Virtualization Productivity Passwords Bandwidth Identity Theft Document Management Word Gadgets Budget VPN Proactive IT Managed Service Provider Office 365 Private Cloud Upgrade Compliance Social Media Connectivity Windows 10 Spam Redundancy Flexibility Public Cloud App Employer-Employee Relationship Data loss Windows 10 Comparison Solid State Drive OneNote IT Management Data Breach Wi-Fi Holiday Data storage CES Windows 7 Password Content Filtering Business Owner IT Plan Information Technology Content Management Paperless Office Smart Tech Apps Work/Life Balance Update Hacking Value Productivity Unsupported Software Networking Blockchain Bring Your Own Device Credit Cards Servers IT Support Data Storage Physical Security Analysis Facebook Automation Big Data Government Website Spam Blocking Miscellaneous Google Drive Office Tips Infrastructure Mobile Device Workers Quick Tips Workplace Tips USB Windows Server 2008 Remote Work Files Password Manager Internet Exlporer Digital Signature Machine Learning HBO Enterprise Content Management Current Events Apple Cables Devices Professional Services Computer Care Settings Reputation Multi-Factor Security Scam PDF Black Market Amazon Web Services Inventory Sync Smart Office Hybrid Cloud IoT webinar Data Management Business Mangement Addiction Screen Mirroring Software as a Service Customer End of Support Encryption YouTube Outlook Specifications Password Management Knowledge Hard Drives iPhone Unified Communications Thought Leadership CrashOverride Tools Samsung Keyboard Trending Online Shopping Access Control Audit Telephony Charger Wireless Technology Emails Monitor History IBM Hosted Solution Regulations Virtual Assistant Conferencing Safety Gmail Cache Cast Internet exploMicrosoft Strategy Frequently Asked Questions Millennials NIST Electronic Medical Records Marketing Network Congestion Hacker Theft Streaming Media Downtime The Internet of Things Lifestyle Education Evernote Authentication Computer Fan Skype Microsoft Office Legal Risk Management Students Recovery Office Insurance Cortana Recycling Wireless Internet Advertising Excel Workforce Cryptocurrency IT Consultant Save Time Google Apps Content Filter Root Cause Analysis Botnet Human Resources Healthcare Software Tips Mobile Computing Supercomputer Applications Wireless Charging Nanotechnology FENG Start Menu Unified Threat Management User Error Google Docs Emergency Relocation Fraud Practices Flash HaaS Colocation eWaste Wire Accountants Tip of the week Telecommuting Safe Mode Leadership Hiring/Firing Health Storage Meetings Travel SaaS Staff Electronic Health Records HVAC Fiber-Optic Mobile Cleaning Netflix HIPAA Data Warehousing Voice over Internet Protocol Patch Management Humor Amazon Hosted Computing Windows 10s Training Entertainment Computing Infrastructure Criminal Sports File Sharing Computer Accessories Automobile Twitter Two Factor Authentication Worker Commute Public Speaking Vendor Management Presentation Administration Assessment Instant Messaging Troubleshooting Business Technology Bluetooth Lithium-ion battery Augmented Reality Video Games Transportation Tech Support Battery Search 5G Books Television How to Techology Company Culture Remote Computing Experience Benefits Webinar Public Computer Customer Relationship Management Telephone System Worker Competition Content WiFi Music Managing Stress IP Address Loyalty Scalability Smart Technology Users IT solutions Best Practice Politics Customer Service Shadow IT Rootkit Audiobook Wearable Technology Employer Employee Relationship Mobile Office Virtual Reality Domains Fun Wireless