Male Rep 1

 

 "The customer is the hero of the Story"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TWINTEL Solutions’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Google Microsoft VoIP roundup nonprofit Software bgc Mobile Devices Managed IT Services Disaster Recovery Alert Email Business Data Business Continuity Outsourced IT Internet communications Windows 10 Ransomware Innovation Smartphones Saving Money Hardware Android Browser IT Services Cybercrime Server Managed IT Services Computer Cloud Computing Data Backup Computers Tech Term Efficiency Small Business IT Support Smartphone Business Management Productivity Internet of Things Office Windows BDR Recovery Managed IT Save Money Data Recovery BYOD Passwords User Tips Cybersecurity Mobile Device Management Money Quick Tips Social Engineering Telephone Systems Network Vulnerability Law Enforcement Artificial Intelligence Upgrade IT Support Mobility Communication Work/Life Balance Collaboration Productivity Hacking Phishing Virtualization Microsoft Office Proactive IT Miscellaneous Budget Flexibility Bring Your Own Device Data Protection Avoiding Downtime Health Holiday Office 365 Social Media Two-factor Authentication Applications Facebook Private Cloud Router Bandwidth Office Tips How To Firewall App Chrome Automation Wi-Fi Password Managed Service Provider Remote Monitoring VPN Google Drive HaaS Word Remote Computing Value Apps Operating System Black Market Data Security Windows 10 Workplace Tips Information Technology History Gadgets Connectivity Mobile Device Compliance Safety Data Breach Identity Theft Redundancy Business Intelligence Credit Cards Marketing Samsung Save Time HIPAA Scam Blockchain Windows 7 Automobile Unsupported Software Worker Data Management USB Infrastructure End of Support Battery Entertainment SaaS Comparison YouTube Servers Workers Big Data Update PDF Paperless Office Solid State Drive OneNote Legal The Internet of Things Charger Risk Management Spam Electronic Medical Records Data Storage Sports Website Employer-Employee Relationship Keyboard Physical Security Mobile Computing Spam Blocking IT Management Content Filtering Wireless Technology Hiring/Firing Cleaning Business Owner IT Plan Emergency CES Data storage Computer Care Document Management Government Computing Infrastructure Patch Management Content Management Access Control Shadow IT Monitor Windows Server 2008 Conferencing Addiction Computer Accessories NIST Cortana Lifestyle Hacker Data Warehousing Supercomputer Bluetooth Authentication Fraud Chromecast Netflix Cache Audit Cryptocurrency Google Apps Mobile Apple Internet Exlporer Current Events Transportation Human Resources Audiobook Amazon Regulations Wireless Internet Computer Fan Safe Mode Loyalty Professional Services iPhone Software Tips Knowledge Benefits Staff Wire Rootkit Amazon Web Services FENG Virtual Assistant Troubleshooting Password Manager Software as a Service Going Green Advertising Network Congestion Smart Technology Digital Signature Scalability Smart Office Training Education Online Shopping Hard Drives Telephone System Business Mangement Specifications Downtime HBO Nanotechnology Two Factor Authentication Encryption Vendor Management Evernote Reputation Flash Relocation Files Screen Mirroring Assessment Books Gmail WiFi Instant Messaging Millennials Robot Outlook IT Consultant Smart Tech Accountants Machine Learning Users Wireless Charging Customers Sync Humor Settings Cast CrashOverride Television Content Hosted Solution Recycling Best Practice Google Docs Laptop Search Workforce Leadership HVAC Virtual Reality Politics Fiber-Optic Telephony Meetings Public Computer eWaste Touchpad How to Telecommuting Frequently Asked Questions NarrowBand Devices Practices Networking Unified Threat Management Worker Commute Cables Skype User Error Data loss Criminal Video Games Voice over Internet Protocol Remote Work Wireless Excel Thought Leadership Hosted Computing Enterprise Content Management Experience Unified Communications Start Menu Windows 10s Colocation Multi-Factor Security Tip of the week webinar Twitter Employer Employee Relationship Inventory Password Management Theft Techology Tools Public Cloud IBM Trending Thank You Congratulations nonprofits