Infracore LLC Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Infracore LLC’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions Malware Microsoft User Tips Data Hackers Productivity Innovation Software Business Hardware Mobile Devices Smartphones Tech Term Backup Internet Communications Business Continuity Smartphone VoIP IT Services Email Windows 10 Browser Data Backup Cloud Computing Computer Android Data Recovery Efficiency Outsourced IT Managed IT Services Business Management Alert Disaster Recovery Workplace Tips Small Business Miscellaneous Communication Artificial Intelligence Router Office Managed IT Services Ransomware Chrome Computers Network IT Support Internet of Things Windows 10 Cybersecurity Cybercrime Law Enforcement Mobile Device Productivity Money Passwords Health Telephone Systems Holiday Office 365 Social Media Password Applications Collaboration How To Gadgets Facebook Virtualization Windows Automation Work/Life Balance Quick Tips Saving Money Upgrade Word Server Information App Spam Wi-Fi Private Cloud Social Engineering Google Drive Encryption Apps Phishing Connectivity HaaS Data Security Office Tips IT Support Bring Your Own Device BDR Microsoft Office Managed Service Save Money Hacking Vulnerability Settings Data Protection Mobility Keyboard Voice over Internet Protocol Mobile Device Management Two-factor Authentication Scam Data Breach Infrastructure Big Data IT Plan Computer Care Marketing End of Support Operating System History Servers VPN Battery Paperless Office Unsupported Software Samsung Human Resources Electronic Medical Records Training Google Docs Bandwidth Fraud Access Control Remote Monitoring Entertainment Remote Computing Managed IT Machine Learning USB PDF Value Comparison Telephony Flexibility Website CES Virtual Assistant Windows 7 Firewall Networking Botnet Employer-Employee Relationship BYOD Legal Managed Service Provider Save Time Automobile Government Charger Content Management Telephone System Sports Data Storage Patch Management Software as a Service Business Intelligence OneNote IT Management Data Management Public Cloud Cleaning Blockchain Redundancy Worker Update Spam Blocking Identity Theft Avoiding Downtime Files Hiring/Firing Cache Shortcuts IT solutions Physical Security Content Millennials Augmented Reality Tools Microchip Music Hybrid Cloud Multi-Factor Security HIPAA Computer Fan Sync Search Data storage Network Congestion Evernote Document Management Virtual Reality Politics Rootkit WiFi Criminal Cryptocurrency Smartwatch Tip of the week Instant Messaging Transportation Safety Credit Cards Inventory Data loss Employer Employee Relationship Password Manager Social Video Games Audiobook Books Assessment Workforce Remote Worker Downtime Search Engine webinar Apple Wearable Technology Trending The Internet of Things How to IT Consultant Wireless Charging Devices Worker Commute Internet exploMicrosoft Safe Mode Employee Windows 10s Windows Server 2008 Benefits Wireless Internet Warranty Screen Mirroring Education Computer Accessories Business Mangement HVAC Vendor HBO Television Accountants Wiring Root Cause Analysis Thought Leadership Bing Conferencing Software Tips iPhone Staff FENG Black Market Leadership Cortana Advertising Vendor Management Digital Signage Amazon Authentication Wire Printer Cast Computing Infrastructure Relocation User Error Bluetooth Gmail Enterprise Content Management Display Outlook Scalability Emergency Public Computer Telecommuting Unified Threat Management Google Apps YouTube Help Desk Emails Troubleshooting Loyalty Specifications MSP Skype Google Search Solid State Drive Flash Wireless Monitor Smart Technology Current Events Amazon Web Services Nanotechnology Mouse Recovery Recycling Password Management Security Cameras Frequently Asked Questions Remote Work Practices Mobile Computing Meetings Travel Workers Addiction Best Practice SaaS Digital Signature File Sharing Start Menu Experience Proactive IT Audit Two Factor Authentication Knowledge Online Shopping Smart Tech Smart Office Administrator Techology Users Humor Risk Management Internet Exlporer eWaste NIST Hacker Excel Information Technology Hosted Computing Camera Managing Stress CrashOverride Regulation Net Neutrality Printers ISP Thank You Congratulations Twitter Company Culture Webinar Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JordaBale Tip of the Week: 10 Technology Practices To Improve Business As Usual
11 February 2019
Just to make your business more progressive you have to follow some techniques and tips. In this reg...
Gabrielle Kolios Microsoft Moves to Get a Piece of the Technology as a Service Market Share
08 February 2019
The company of the Microsoft has been really now understood the technology which have to be supposed...
AngusCousens Tip of the Week: How To Enable Flash In Google Chrome
06 February 2019
Google is another popular makeup brand. Ladies can get products for eye makeup also. They can use ht...
Cannedguds These 3 Industries are Being Fundamentally Changed by Smart Technology
29 January 2019
While I support the idea of automated or driverless cars in theory, at the moment they just simply m...
Joan Cameron Tip of the Week: 4 Tools that Provide Your Employees With Greater Flexibility
21 January 2019
These are very helpful tools with we can get rid from lots of unwanted efforts of work. Best essay w...