Male Rep 4

 

 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TWINTEL Solutions’s blog.

Know Your Tech: CMS
Knowing, and Planning For, Your Organization’s Com...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business Business Continuity communications bgc Email roundup Internet nonprofit Software Alert User Tips IT Services Innovation Managed IT Services Outsourced IT Hardware Smartphones Data Backup Productivity Tech Term Windows 10 Browser Managed IT Services Server Data Recovery Computer Cloud Computing Saving Money Smartphone Efficiency Ransomware Android Workplace Tips Cybercrime IT Support Internet of Things Communication Business Management Small Business Network BDR Computers IT Support Office Productivity Miscellaneous Windows Artificial Intelligence Quick Tips Passwords Cybersecurity Save Money Windows 10 Holiday Telephone Systems BYOD Applications Router Managed IT Recovery Money Social Engineering Mobile Device Chrome Mobility Gadgets Mobile Device Management Wi-Fi Work/Life Balance Social Media Automation Virtualization Office 365 Collaboration Vulnerability Hacking Upgrade Law Enforcement Facebook Proactive IT Firewall Private Cloud Phishing Health Information Microsoft Office Password Two-factor Authentication Remote Monitoring Managed Service Provider Google Drive Word VPN How To Office Tips Budget Avoiding Downtime Flexibility Compliance Data Protection Bring Your Own Device Bandwidth App Sports Data Breach Voice over Internet Protocol Connectivity Mobile Computing Software as a Service Encryption Managed Service Data Security Servers Identity Theft Information Technology Safety Settings Scam Business Intelligence HaaS Save Time History Value Black Market Operating System Remote Computing Spam Apps Keyboard Redundancy Cleaning Battery Content Filtering Entertainment CES IT Management Training Workers Business Owner Computer Care PDF Emergency Government Comparison Computing Infrastructure Content Management Big Data Patch Management Solid State Drive IT Plan Wireless Technology OneNote Marketing Update Access Control Document Management YouTube Samsung Charger Hacker Blockchain Virtual Assistant Legal Credit Cards HIPAA WiFi Risk Management Physical Security Electronic Medical Records Human Resources Telephone System Windows 7 Fraud Google Docs Automobile The Internet of Things Worker Employer-Employee Relationship Infrastructure Paperless Office Unified Threat Management Spam Blocking End of Support Telephony Unsupported Software Data storage USB Data Storage Website Data Management SaaS Hiring/Firing Machine Learning Windows 10s Reputation Advertising Skype Cables Digital Signature Smart Technology Touchpad Network Congestion Help Desk Software Tips Cache Video Games Monitor Colocation Net Neutrality Amazon Web Services Cryptocurrency Troubleshooting Hard Drives Warranty NarrowBand HVAC Scalability Experience Meetings Inventory Wiring Employer Employee Relationship webinar Robot Botnet Excel Remote Work Business Mangement Public Cloud Customers Start Menu Unified Communications Education Two Factor Authentication Shortcuts Wireless Internet ISP Online Shopping Safe Mode Going Green IBM Relocation Multi-Factor Security Devices Printer Vendor Management Gmail Networking Assessment Data loss Techology Computer Accessories Conferencing Files Smartwatch Tip of the week Tools Theft Accountants MSP IT Consultant Social HBO Specifications Cortana Wire Flash Evernote Shadow IT Books Supercomputer Humor Microchip Trending Thought Leadership Mouse Recycling Enterprise Content Management Instant Messaging Television CrashOverride Screen Mirroring Authentication Bluetooth Netflix Employee Windows Server 2008 Audit File Sharing Users Leadership Apple Vendor Outlook Millennials Google Apps Smart Office Internet Exlporer Sync Wireless Charging Hosted Solution Transportation Current Events Search Engine Data Warehousing Lifestyle Twitter Administrator Best Practice Content Digital Signage eWaste Password Management Search Public Computer Cast Nanotechnology Camera Politics Loyalty Computer Fan Mobile Practices Augmented Reality Virtual Reality iPhone Display Workforce Chromecast Fiber-Optic Staff Regulation Benefits Laptop Knowledge Bing Addiction Audiobook User Error Google Search Regulations Amazon Criminal NIST How to Smart Tech Printers Rootkit FENG Wireless Professional Services Hosted Computing Remote Worker Worker Commute Downtime Security Cameras Frequently Asked Questions Telecommuting Password Manager GDPR nonprofits E-Commerce Thank You Congratulations