(707) 268-8850    Get SUPPORT

Network Management Services Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Network Management Services’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup VoIP Mobile Devices Hosted Solutions Innovation Backup Google Email Data Recovery Data Outsourced IT Tech Term IT Support Internet of Things Internet Microsoft Cloud Computing Software Saving Money IT Services Hardware Efficiency BDR Communications Business Continuity Communication Small Business Ransomware Cybercrime Cybersecurity Business Smartphones Android Artificial Intelligence Server Disaster Recovery User Tips Managed IT Services Network Computers Avoiding Downtime Gadgets Save Money Browser How To Smartphone Managed IT Windows Alert Collaboration Mobile Device Management Two-factor Authentication Vulnerability Computer Router BYOD Chrome Passwords Firewall Phishing Applications Money Productivity Workplace Tips Business Intelligence Miscellaneous Mobility Social Engineering Law Enforcement Social Media Data Security Data Protection Windows 10 Business Management Remote Monitoring Virtualization Operating System Document Management Compliance Identity Theft Blockchain Facebook VPN Word Budget Productivity Flexibility Bandwidth Managed Service Provider Connectivity Office 365 Telephone Systems Private Cloud Proactive IT Upgrade IT Support Spam Redundancy Windows 10 Data loss Information Technology Unified Threat Management Work/Life Balance Encryption Data storage Comparison OneNote Content Management Paperless Office IT Management Access Control Wi-Fi Smart Tech Windows 7 Training Workers Information IT Plan File Sharing Update Credit Cards Hacking Apps Settings Data Breach Analysis Managed Service Content Filtering Unsupported Software Microsoft Office Office Tips Automation Data Storage Mobile Device Physical Security Servers Infrastructure Government Big Data Mobile Computing Website Virtual Assistant App Sports Google Drive Spam Blocking Solid State Drive Value Holiday Networking Bring Your Own Device Quick Tips Password CES Employer-Employee Relationship Public Cloud Business Owner Apple Supercomputer IoT Reputation Internet Exlporer Windows Server 2008 Remote Work Business Mangement Addiction Emergency YouTube HBO Hosted Solution Unified Communications Thought Leadership Professional Services Multi-Factor Security Leadership Online Shopping Hybrid Cloud Safe Mode Sync SaaS Hard Drives Cache iPhone MSP Screen Mirroring Software as a Service Legal Risk Management Customer End of Support HVAC Education Cleaning Netflix Gmail Patch Management Strategy Monitor History Outlook Specifications Recovery Theft Streaming Media Augmented Reality CrashOverride Tools Students Trending Evernote Authentication Wireless Technology Audit Telephony Save Time Recycling Wireless Internet IBM Remote Worker Cast Current Events Insurance Internet exploMicrosoft Safety Enterprise Content Management Regulations Computer Care HaaS Scam Marketing Hacker Frequently Asked Questions Millennials Google Apps Content Filter The Internet of Things Downtime Human Resources Cortana Healthcare Lifestyle webinar Wireless Charging Nanotechnology Office Business Technology Computer Fan Skype eWaste Wire Wiring HIPAA Knowledge Fraud Practices Advertising Password Management Samsung Root Cause Analysis Botnet Entertainment Accountants User Error Excel Workforce Charger Emails Storage Staff Electronic Health Records Colocation Software Tips USB Conferencing Fiber-Optic Relocation FENG Start Menu Criminal Hiring/Firing Health Camera Google Docs Electronic Medical Records Network Congestion Amazon Hosted Computing NIST Flash Meetings Travel Tip of the week Telecommuting PDF Black Market Password Manager Data Management Digital Signature Machine Learning Computing Infrastructure Cables Devices Humor Telephone System Mobile Smart Office Files Data Warehousing Voice over Internet Protocol Keyboard IT Consultant Amazon Web Services Inventory Cryptocurrency Windows 10s Line of Business Smart Technology Battery IT solutions Techology Administration How to Rootkit Public Speaking Regulation Remote Computing Experience Employer Employee Relationship Presentation Lithium-ion battery Content Company Culture Search Tech Support Scalability Music Computer Accessories 5G Best Practice Politics Two Factor Authentication Audiobook Managing Stress Shadow IT Vendor Management Assessment Wearable Technology Bluetooth Customer Relationship Management WiFi Competition Virtual Reality Transportation IP Address Proactive Books Television Users Automobile Customer Service Worker Commute Remote Monitoring and Maintenance Benefits Mobile Office Webinar Twitter Public Computer Instant Messaging Troubleshooting Worker Fun Domains Printers Video Games Wireless Loyalty