(707) 268-8850    Get SUPPORT

Network Management Services Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Network Management Services’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 17 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions VoIP Mobile Devices Email Google Data Recovery Outsourced IT Data Tech Term IT Support Saving Money Internet of Things Internet Microsoft Cloud Computing IT Services Software Communications Hardware BDR Business Continuity Efficiency Cybersecurity Ransomware Business Smartphones Cybercrime Communication Small Business Artificial Intelligence User Tips Server Disaster Recovery Android Network Avoiding Downtime Computers Managed IT Services Save Money Managed IT Smartphone Windows Alert Gadgets How To Browser Router BYOD Miscellaneous Applications Social Media Business Management Money Business Intelligence Mobile Device Management Windows 10 Two-factor Authentication Data Security Data Protection Computer Chrome Workplace Tips Passwords Firewall Phishing Social Engineering Mobility Law Enforcement Vulnerability Productivity Collaboration Document Management Operating System Virtualization Word Office 365 Proactive IT IT Support Facebook Upgrade Identity Theft Spam VPN Blockchain Flexibility Managed Service Provider Compliance Redundancy Private Cloud Telephone Systems Connectivity Budget Remote Monitoring Productivity Bandwidth Update CES Big Data Value Information Website File Sharing Unsupported Software Networking Encryption Access Control Data Storage Bring Your Own Device Content Management Paperless Office Servers Hacking Managed Service Smart Tech Unified Threat Management Mobile Computing Office Tips Spam Blocking Windows 10 Physical Security Mobile Device Automation Credit Cards Virtual Assistant Government Wi-Fi Analysis Training Workers App Solid State Drive Google Drive Data loss OneNote Settings Infrastructure Holiday Comparison Password IT Management Apps Data Breach Quick Tips Business Owner Public Cloud Content Filtering Sports Employer-Employee Relationship Windows 7 Microsoft Office Information Technology Work/Life Balance IT Plan Data storage HVAC Amazon Web Services Inventory Hybrid Cloud Cast MSP Smart Office Regulations Conferencing Education Customer End of Support Downtime Business Mangement Addiction Legal Hard Drives Risk Management iPhone Frequently Asked Questions Millennials Electronic Medical Records Network Congestion IoT Computer Fan Skype Unified Communications Thought Leadership Lifestyle YouTube Recovery Monitor History Enterprise Content Management Online Shopping Save Time Remote Worker Internet exploMicrosoft Root Cause Analysis Botnet Gmail Cache Excel Workforce IT Consultant FENG Start Menu Business Technology Theft Streaming Media HaaS Software Tips Supercomputer Strategy Password Management Evernote Authentication Office Google Docs Emergency Wiring Students Cortana Flash Advertising Meetings Travel SaaS Recycling Wireless Internet HIPAA Tip of the week Telecommuting Leadership Insurance Mobile Cleaning Netflix Google Apps Content Filter Entertainment User Error NIST Wireless Charging Nanotechnology Relocation Data Warehousing Voice over Internet Protocol Patch Management Camera Human Resources Healthcare USB Colocation Windows 10s Fraud Practices eWaste Wire Hiring/Firing Health Windows Server 2008 Remote Work Augmented Reality Professional Services Computer Care Telephone System Storage HBO Wireless Technology Current Events Accountants PDF Black Market Sync IBM Cryptocurrency Fiber-Optic Data Management Humor Multi-Factor Security Safety Scam Staff Electronic Health Records Computing Infrastructure Amazon Hosted Computing Screen Mirroring Software as a Service Marketing Hacker Criminal Keyboard Files The Internet of Things webinar Reputation Internet Exlporer CrashOverride Tools Samsung Password Manager Apple Outlook Specifications Knowledge Audit Telephony Charger Emails Safe Mode Cables Devices Trending Digital Signature Machine Learning Hosted Solution IP Address Books Television Remote Computing Experience Users Customer Service Webinar Search Content Benefits Worker WiFi Mobile Office Public Computer Scalability Music Loyalty Best Practice Politics Domains IT solutions Audiobook Wireless Smart Technology Company Culture Shadow IT Rootkit Wearable Technology Virtual Reality Proactive Public Speaking Employer Employee Relationship Presentation Managing Stress Automobile Lithium-ion battery Worker Commute Remote Monitoring and Maintenance Computer Accessories Tech Support 5G Two Factor Authentication Vendor Management Fun Printers Instant Messaging Troubleshooting Assessment Line of Business Video Games Bluetooth Battery Regulation Twitter Customer Relationship Management Techology Competition Transportation How to Administration