XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on XFER’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Small Business Hackers Hosted Solutions Data Google Productivity Mobile Office Mobile Devices Hardware VoIP Email Gadgets Quick Tips Malware Network Security Network IT Support Efficiency Social Media Innovation Business Management IT Services Miscellaneous Server Business Continuity Smartphones Business Virtualization Upgrade Windows Communication Disaster Recovery Microsoft Office Managed IT Services Users Communications Computer User Tips Data Backup Passwords Mobile Device Management Android Browser Marketing Save Money Smartphone WiFi Alert Holiday Data Recovery Tech Term Vendor Management Ransomware Mobile Computing Operating System Windows 10 Outsourced IT Remote Monitoring Cybercrime Internet of Things Avoiding Downtime BDR Cloud Computing Bring Your Own Device Apple Computers BYOD Information Technology Best Practice History VPN Big Data Telephone Systems Remote Computing Firewall IT Solutions The Internet of Things Artificial Intelligence Chrome Router Current Events Going Green Automation Spam Employer-Employee Relationship Cybersecurity Phone System Facebook Trending Wireless Technology Application Collaboration IT Consultant Hacking Health Social Engineering Proactive IT Managed IT Services Excel Office App Printer Budget Lithium-ion Battery Bandwidth Money Networking Unified Threat Management Windows 8 Business Intelligence Two-factor Authentication iPhone Mobility How To Recovery Content Filtering Applications Business Managament Fax Server Maintenance PowerPoint Gmail Managed IT Antivirus Customer Relationship Management Hard Drives Analytics Private Cloud Training Data Protection User Error Mouse Redundancy Law Enforcement Humor Office 365 Outlook Tutorials Data Security Virus Phishing Windows 10 Apps Value Sports Website Compliance Streaming Media Risk Management Vulnerability Tech Support Flexibility Analysis Entertainment Saving Time Settings Retail Connectivity Data Management Inbound Marketing Blockchain Downtime Word File Sharing Memory Network Congestion Productivity Conferencing Encryption Identity Theft Administration Save Time Mobile Device Social Networking Tablet Digital Payment Search Twitter Office Tips Computer Repair IT Management Document Management IT Support Google Drive Data storage Servers Information Education Piracy CES Statistics Data Storage IBM IT Plan eWaste Administrator Internet Exlporer Leadership Programming Work/Life Balance Data Breach Instant Messaging Paperless Office Skype PDF Managed Service Scam HaaS End of Support Computer Accessories Content Management Safety Environment Wi-Fi Unsupported Software Augmented Reality Intranet Workers Government Infrastructure Running Cable YouTube Human Resources Wearable Technology Meetings Biometrics Social IT service Virtual Assistant Update DDoS Hacker Data loss Comparison Best Available Solid State Drive Windows 7 Spam Blocking Touchscreen Bluetooth Black Market People Webinar Wireless Physical Security Robot Samsung Cleaning USB Password Access Control Public Cloud Smart Tech Credit Cards Online Currency SaaS Video Surveillance Recycling Machine Learning Point of Sale OneNote Cost Management Webcam Smart Office Wireless Charging Hybrid Cloud Insurance Multi-Factor Security Strategy IT Security Storage Frequently Asked Questions Fraud Hosted Solution IaaS Computing Infrastructure Safe Mode Print Server Upgrades Computer Care Touchpad Analyitcs Workforce Remote Support Keyboard Relocation Customer Service HVAC Professional Services Google Apps nternet Crowdfunding Legal Nanotechnology Remote Worker Monitor Flash Fiber-Optic Consultant Audit PC Care Practices Lifestyle Addiction Tip of the week Amazon Macro Company Culture Netflix 3D Accountants Business Technology Software as a Service Law Firm IT Scheduling Telecommuting Co-managed IT Cameras eBay Enterprise Content Management Tools Root Cause Analysis Wiring Supercomputer Reputation Students Sync Cables LinkedIn Licensing Computer Fan Alerts Hosted Computing Proactive Cache Windows Server 2008 Amazon Web Services Net Neutrality WIndows 7 Internet exploMicrosoft Virtual Reality Software Tips Remote Work Windows 8.1 Update Printer Server Shortcut Text Messaging Password Management Password Manager NarrowBand Devices GDPR Display Worker Commute Knowledge Customers Gaming Console Healthcare Telephony Unified Communications Uninterrupted Power Supply User FENG Work Station Inventory Remote Monitoring and Maintenance Wireless Internet Online Shopping Patch Management Managing Stress Advertising Domains IoT Telephone System Google Docs Staff Debate Bloatware 360 Distributed Denial of Service Emails Files NIST Botnet Business Mangement Chromecast Science Screen Mirroring Thought Leadership E-Commerce Data Warehousing Specifications Electronic Health Records Start Menu Theft Electronic Medical Records Line of Business Entrepreneur Wire Regulations Evernote Notifications Windows 10s Voice over Internet Protocol Digital Signature Business Owner HBO Colocation Cryptocurrency Travel Criminal Help Desk Charger Laptop Tablets Cast Content Filter Millennials HIPAA SharePoint Windows Media Player Virtual Desktop Mobile Cortana Hiring/Firing Hiring/Firing Shadow IT Authentication MSP Automobile Public Computer Benefits Printers IT solutions Congratulations Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Content Two Factor Authentication Emergency Battery Music Worker Video Games Audiobook Assessment Rootkit Scalability Politics Television Transportation Regulation Camera Troubleshooting Webinar How to Thank You Techology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *