Male Rep 4


 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website:

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TWINTEL Solutions’s blog.

Know Your Tech: CMS
Knowing, and Planning For, Your Organization’s Com...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery bgc Email roundup Software nonprofit Innovation Internet Managed IT Services Business Continuity Alert Hardware Outsourced IT communications IT Services Smartphones Windows 10 Managed IT Services User Tips Tech Term Data Backup Browser Saving Money Ransomware Server Computer Android Cloud Computing Cybercrime Efficiency Data Recovery Workplace Tips Network Smartphone BDR Computers Internet of Things IT Support Business Management Small Business Miscellaneous Windows Quick Tips Passwords Productivity Save Money Office IT Support Communication Productivity Telephone Systems Chrome BYOD Applications Artificial Intelligence Recovery Managed IT Money Social Engineering Mobile Device Management Cybersecurity Virtualization Phishing Upgrade Law Enforcement Hacking Collaboration Facebook Windows 10 Vulnerability Firewall Gadgets Mobility Social Media Work/Life Balance Compliance Password Automation Holiday Managed Service Provider Office 365 Remote Monitoring VPN Router Two-factor Authentication Office Tips Avoiding Downtime Proactive IT Budget Flexibility Private Cloud Data Protection Bring Your Own Device Bandwidth Health App Information How To Wi-Fi Microsoft Office Data Security Servers Google Drive Identity Theft Safety Information Technology Business Intelligence History Data Breach Black Market HaaS Word Operating System Remote Computing Spam Apps Scam Mobile Device Redundancy Keyboard Value Sports Connectivity Mobile Computing Employer-Employee Relationship Government Business Owner PDF Software as a Service Encryption Managed Service Wireless Technology Solid State Drive Comparison Unified Threat Management Spam Blocking Emergency Computing Infrastructure IT Plan Big Data Content Management YouTube Marketing Hiring/Firing SaaS Document Management Update Cleaning Training Workers Blockchain Virtual Assistant Legal HIPAA Credit Cards Save Time Physical Security WiFi Risk Management Computer Care Patch Management Telephone System The Internet of Things Windows 7 Fraud OneNote Automobile Samsung Infrastructure Paperless Office End of Support Unsupported Software Charger Settings Data storage USB Data Management Data Storage Website Electronic Medical Records Entertainment Battery Content Filtering Voice over Internet Protocol Worker CES IT Management Inventory Wiring Scalability Experience Excel Remote Work Loyalty Computer Fan Business Mangement HVAC Customers Meetings Relocation Wireless Internet Going Green Education Start Menu Unified Communications Benefits Knowledge Multi-Factor Security Rootkit Devices Printer Files Online Shopping Bing Safe Mode Access Control Tip of the week FENG Gmail Networking Techology Data loss Network Congestion Accountants MSP Humor HBO Specifications Windows 10s Cortana Wire Hacker Tools Theft Smart Technology Trending Thought Leadership Mouse Shadow IT Books Flash Evernote Help Desk Employer Employee Relationship webinar Authentication Instant Messaging Apple Windows Server 2008 Recycling Enterprise Content Management Screen Mirroring Two Factor Authentication File Sharing Outlook Millennials Public Cloud Google Apps Smart Office Users Internet Exlporer Data Warehousing Lifestyle Vendor Management Twitter Administrator Hosted Solution Sync Wireless Charging IBM Human Resources Best Practice Content Computer Accessories Conferencing Nanotechnology Camera Search iPhone Assessment eWaste Password Management Cast Google Docs IT Consultant Practices Augmented Reality Chromecast Politics Workforce Laptop Virtual Reality Mobile Audiobook Addiction User Error Telephony Fiber-Optic Supercomputer Staff Regulation Bluetooth Netflix Smart Tech Printers How to Downtime Regulations Amazon Microchip Television CrashOverride Criminal NIST Wireless Leadership Hosted Computing Remote Worker Frequently Asked Questions Telecommuting Audit Password Manager Machine Learning Touchpad Worker Commute Reputation Advertising Professional Services NarrowBand Video Games Hard Drives Software Tips Cache Monitor Colocation Skype Cables Transportation Current Events Digital Signature Warranty Troubleshooting Robot Amazon Web Services Search Engine Public Computer Cryptocurrency GDPR nonprofits Thank You E-Commerce Congratulations