Infracore LLC Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website:

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Infracore LLC’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Hackers Google Malware Microsoft Software Innovation Internet Data Hardware Backup Tech Term Smartphones Hosted Solutions Email Windows 10 Browser Business Continuity Business Computer VoIP Mobile Devices Android Managed IT Services User Tips Alert Workplace Tips Data Backup IT Services Small Business Miscellaneous Cloud Computing Smartphone Productivity Office Communications Computers Disaster Recovery Ransomware Outsourced IT Business Management Cybercrime Efficiency Artificial Intelligence Data Recovery Communication Law Enforcement Password Applications Windows 10 Facebook Virtualization Productivity Windows Money How To Passwords Internet of Things Network Social Media Telephone Systems Router Chrome Collaboration Cybersecurity Managed IT Services Saving Money Quick Tips Office 365 Upgrade Health Work/Life Balance Server Social Engineering Gadgets App Wi-Fi Scam Two-factor Authentication Data Breach Vulnerability Spam Connectivity Apps Mobile Device Management Bring Your Own Device HaaS Information Office Tips Save Money Phishing Private Cloud IT Support Holiday Word IT Support Data Security Data Protection Microsoft Office Keyboard Hacking Google Drive Automation Business Intelligence Legal Cleaning Blockchain End of Support Mobility Automobile Worker Windows 7 Big Data Update History Identity Theft Settings Encryption BYOD Computer Care Infrastructure Data Storage Data Management OneNote Electronic Medical Records VPN PDF Mobile Device Samsung Marketing Bandwidth IT Management Training Redundancy Avoiding Downtime Entertainment Fraud Spam Blocking Paperless Office Value Battery BDR Managed Service Provider USB Firewall Comparison Networking IT Plan Government Website CES Managed Service Operating System Virtual Assistant Employer-Employee Relationship Remote Computing Unsupported Software Public Cloud Charger Patch Management Content Management Remote Monitoring Flexibility Managed IT Telephone System Sports FENG Telephony Data storage Password Management Two Factor Authentication Knowledge Digital Signature Conferencing Software Tips Hybrid Cloud Mobile Computing Experience Workers Addiction Cast File Sharing Risk Management Online Shopping Smart Tech Wireless eWaste Botnet Hiring/Firing Hosted Computing Outlook Smart Office Skype NIST Millennials Network Congestion Emails Apple Best Practice Camera Music Cache Transportation Multi-Factor Security Safety HIPAA Internet exploMicrosoft Augmented Reality Politics Rootkit Evernote Solid State Drive Flash Books Assessment Criminal Meetings Travel Techology Users Employer Employee Relationship Credit Cards Inventory Frequently Asked Questions Information Technology Document Management Start Menu Cryptocurrency Workforce IT Consultant iPhone Content Wearable Technology Password Manager Search Servers Benefits Trending Human Resources Advertising Remote Worker Wireless Charging Devices Audit Google Docs Television Relocation User Error Virtual Reality Computer Accessories Access Control Excel Instant Messaging Business Mangement Tools Safe Mode Leadership Accountants IT solutions Physical Security Video Games Audiobook Wireless Internet Warranty Sync Monitor How to HVAC Staff Wiring Vendor Management Cortana Thought Leadership Computer Fan Machine Learning Emergency Public Computer Data loss Worker Commute Bluetooth Amazon Authentication Tip of the week Troubleshooting Loyalty Gmail Downtime Education Save Time Telecommuting Wire Printer The Internet of Things Black Market Enterprise Content Management Smart Technology Specifications Current Events webinar Unified Threat Management Google Apps YouTube Voice over Internet Protocol Screen Mirroring Humor Internet Exlporer MSP Amazon Web Services Nanotechnology Windows 10s Windows Server 2008 Recovery SaaS Recycling Root Cause Analysis Files Computing Infrastructure Remote Work Practices HBO Scalability Mouse Company Culture Compliance Administrator Managing Stress WiFi Regulation Thank You Webinar Printers Congratulations CrashOverride Twitter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JeffreyKGuertin Tech Term: Modems and Routers Defined
18 October 2018
Thank you so much for defining here the modems and routers to give us better information about this....
Shay Stuart How the Convenience of The Internet of Things Can Come Back to Bite Us
17 October 2018
This is a very important share that delivers facts about the utilization of internet tools in differ...
Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...