Male Rep 2


 "Customer's perception is our reality"

Have IT Questions?
Call us now (888) 894-6411


Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website:

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TWINTEL Solutions’s blog.

Know Your Tech: CMS
Knowing, and Planning For, Your Organization’s Com...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Microsoft Google VoIP Email Data bgc Software roundup Disaster Recovery nonprofit Managed IT Services Alert Outsourced IT Innovation Internet Business Business Continuity Smartphones Tech Term IT Services communications Windows 10 Hardware Ransomware Saving Money Cybercrime Android Managed IT Services Browser Server Data Backup Computer Computers Efficiency Internet of Things IT Support Small Business Cloud Computing Windows BDR Passwords Data Recovery Smartphone Quick Tips User Tips Save Money Business Management Productivity Office Network Miscellaneous Cybersecurity Artificial Intelligence Recovery IT Support Communication Applications Money Mobile Device Management Social Engineering Managed IT Telephone Systems BYOD Upgrade Law Enforcement Work/Life Balance Hacking Facebook Virtualization Workplace Tips Collaboration Gadgets Phishing Firewall Social Media Productivity Mobility Vulnerability App Data Protection VPN Wi-Fi Password How To Proactive IT Holiday Compliance Office 365 Router Office Tips Private Cloud Remote Monitoring Chrome Avoiding Downtime Bring Your Own Device Bandwidth Health Windows 10 Two-factor Authentication Flexibility Automation Budget Managed Service Provider Microsoft Office Google Drive Value Information Technology History Black Market Remote Computing Data Security Operating System Identity Theft Connectivity HaaS Sports Data Breach Business Intelligence Mobile Computing Redundancy Word Apps Mobile Device Safety Scam Solid State Drive Unsupported Software Charger Settings Computing Infrastructure Keyboard Marketing Battery Content Filtering Data Storage Website Entertainment Electronic Medical Records Infrastructure Paperless Office Business Owner Emergency IT Management Worker The Internet of Things Employer-Employee Relationship Physical Security Big Data Document Management Comparison Unified Threat Management Spam Blocking IT Plan Information Servers Update CES Hiring/Firing Legal SaaS Save Time Cleaning End of Support HIPAA Encryption Managed Service Training Workers Data storage Risk Management Content Management Credit Cards Automobile Computer Care Patch Management Wireless Technology Blockchain Virtual Assistant Windows 7 YouTube OneNote Government Data Management Spam Samsung PDF USB Google Apps Smart Office Supercomputer Relocation Worker Commute File Sharing Telephony Fiber-Optic Human Resources Telephone System Bluetooth Netflix Files Video Games Regulations Amazon Twitter Television CrashOverride Professional Services eWaste Password Management Leadership Frequently Asked Questions Telecommuting Nanotechnology Camera Audit Troubleshooting Transportation Current Events Humor Software Tips Practices Augmented Reality Hacker Scalability Experience Skype Cables Education Voice over Internet Protocol Staff Regulation Amazon Web Services Addiction Public Computer Meetings Software as a Service Criminal NIST Apple Excel Remote Work Smart Tech Loyalty Computer Fan Password Manager Machine Learning Benefits Knowledge Techology Laptop Hosted Computing Remote Worker Internet Exlporer Start Menu Unified Communications Chromecast Multi-Factor Security Digital Signature Rootkit Online Shopping Cache Data loss Cryptocurrency iPhone Tip of the week FENG Shadow IT Books Business Mangement HVAC Smart Technology Network Congestion HBO Specifications Touchpad Inventory Wiring Windows 10s Instant Messaging Tools Theft Users Trending User Error Flash Evernote NarrowBand Wireless Internet Hosted Solution Screen Mirroring WiFi Safe Mode Employer Employee Relationship webinar Downtime Best Practice Content Windows Server 2008 Devices Wireless Gmail Networking Two Factor Authentication Outlook Millennials Access Control Public Cloud Reputation Advertising Search Wire IBM Hard Drives Virtual Reality Data Warehousing Lifestyle Going Green Accountants MSP Vendor Management Monitor Colocation Politics Sync Wireless Charging Cortana Cast Google Docs Computer Accessories Conferencing Robot Audiobook Fraud Thought Leadership Assessment Recycling Enterprise Content Management IT Consultant Workforce Authentication Customers How to Mobile Thank You Congratulations Printers nonprofits GDPR E-Commerce