(707) 268-8850    Get SUPPORT

Network Management Services Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Network Management Services’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Hosted Solutions Mobile Devices Email Google Data Recovery Tech Term Outsourced IT Data IT Support Cloud Computing Saving Money Internet Microsoft Software Internet of Things BDR Hardware IT Services Business Continuity Efficiency Communications Business Cybersecurity Cybercrime Small Business Ransomware Disaster Recovery User Tips Android Smartphones Artificial Intelligence Communication Server Alert Smartphone Windows How To Avoiding Downtime Save Money Managed IT Network Gadgets Browser Managed IT Services Computers Money Miscellaneous Chrome Phishing Collaboration Firewall Social Media Mobile Device Management Router Law Enforcement Business Intelligence Social Engineering BYOD Two-factor Authentication Windows 10 Data Security Data Protection Applications Passwords Business Management Productivity Vulnerability Mobility VPN Office 365 Compliance Word Upgrade Identity Theft Managed Service Provider Blockchain Spam Document Management Private Cloud Productivity Facebook Bandwidth Computer Remote Monitoring Redundancy Connectivity Proactive IT IT Support Virtualization Operating System Flexibility Workplace Tips Budget Telephone Systems Information Website Update Encryption Password File Sharing Training Workers Content Management Paperless Office Business Owner Access Control Automation Unsupported Software Information Technology Smart Tech Physical Security Government Managed Service Data Storage Settings Servers Work/Life Balance Data Breach Windows 10 Mobile Computing Content Filtering Credit Cards Google Drive Analysis Spam Blocking Virtual Assistant Wi-Fi Quick Tips Employer-Employee Relationship Public Cloud Infrastructure Value Data loss Data storage Office Tips Networking OneNote Apps Mobile Device Sports Comparison Bring Your Own Device IT Management Microsoft Office Unified Threat Management Windows 7 App CES Solid State Drive Holiday IT Plan Big Data Hacking Unified Communications Thought Leadership Cast Cleaning Netflix YouTube Regulations Data Management Office Downtime Keyboard Cortana Frequently Asked Questions Millennials Patch Management Online Shopping Gmail Cache Remote Worker Lifestyle Enterprise Content Management Advertising Computer Fan Skype Theft Streaming Media Computer Care Hosted Solution Strategy User Error Current Events Relocation Business Technology Root Cause Analysis Botnet Students Colocation Excel Workforce Scam Evernote Authentication Start Menu Legal webinar Risk Management Recycling Wireless Internet Hiring/Firing Health Wiring Software Tips Education Insurance Password Management FENG Google Apps Content Filter Google Docs Samsung Recovery Flash Knowledge Humor Meetings Travel Charger Emails Human Resources Healthcare Computing Infrastructure Tip of the week Telecommuting Save Time Wireless Charging Nanotechnology Mobile Conferencing eWaste Wire Files Fraud Practices NIST HaaS Network Congestion Storage Apple Data Warehousing Voice over Internet Protocol Augmented Reality Accountants Reputation Internet Exlporer Windows 10s Electronic Medical Records Telephone System Wireless Technology Staff Electronic Health Records Windows Server 2008 Remote Work Fiber-Optic Professional Services Safety HIPAA Criminal HBO IBM Amazon Hosted Computing Cryptocurrency Hybrid Cloud IT Consultant Entertainment Password Manager Hard Drives iPhone The Internet of Things Multi-Factor Security Customer End of Support Marketing Sync Hacker Cables Devices Screen Mirroring Software as a Service USB Digital Signature Machine Learning Monitor History Supercomputer Safe Mode CrashOverride Tools Smart Office Outlook Specifications Emergency Amazon Web Services Inventory Leadership Business Mangement Addiction MSP Trending PDF SaaS Black Market IoT HVAC Internet exploMicrosoft Audit Telephony Instant Messaging Troubleshooting Users Video Games Customer Service Computer Accessories Battery Mobile Office Domains WiFi How to Company Culture Two Factor Authentication Techology Wireless Vendor Management Remote Computing Experience Bluetooth Assessment Proactive Public Speaking Managing Stress Content Fun Presentation Scalability Music Transportation Lithium-ion battery Best Practice Politics Camera Books Television Audiobook Remote Monitoring and Maintenance Shadow IT 5G Webinar Wearable Technology Administration Tech Support Benefits Worker Printers Public Computer Virtual Reality Twitter Line of Business Loyalty Search Regulation IT solutions Smart Technology Automobile Competition Rootkit Customer Relationship Management Worker Commute Employer Employee Relationship IP Address