XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on XFER’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network Efficiency IT Support Innovation Business Social Media Business Management IT Services Smartphones Server Miscellaneous Business Continuity Upgrade Virtualization Communication Windows Disaster Recovery Data Backup Computer User Tips Communications Microsoft Office Managed IT Services Users Mobile Device Management Browser Passwords Data Recovery Android WiFi Marketing Save Money Smartphone Alert Holiday Ransomware Tech Term Vendor Management BDR Mobile Computing Cybercrime Outsourced IT Operating System Windows 10 Internet of Things Remote Monitoring Chrome Cloud Computing Information Technology Avoiding Downtime Computers Bring Your Own Device Apple BYOD History Best Practice Big Data Remote Computing VPN IT Solutions Firewall The Internet of Things Artificial Intelligence Telephone Systems Router Current Events Automation Cybersecurity Going Green Spam Employer-Employee Relationship Printer Facebook Phone System Trending Application Wireless Technology Managed IT Services Collaboration Hacking IT Consultant Health Social Engineering Proactive IT Excel Office App Budget Lithium-ion Battery Bandwidth Money Windows 8 How To Networking Productivity Unified Threat Management Applications Business Intelligence Windows 10 Two-factor Authentication Mobility iPhone Recovery Mouse Business Managament Content Filtering Fax Server Maintenance Law Enforcement Office 365 Gmail Encryption PowerPoint Antivirus Phishing Analytics User Error Customer Relationship Management Humor Hard Drives Training Data Protection Blockchain Managed IT Outlook Tutorials Virus Data Security Value Sports Information Private Cloud Website Apps Redundancy Computer Repair Streaming Media Risk Management Compliance Tech Support Flexibility IT Management Connectivity Servers Entertainment Scam Saving Time Retail Administrator Settings Google Drive Downtime IT Support Network Congestion File Sharing Memory Vulnerability Inbound Marketing Conferencing Word Save Time Identity Theft Tablet Administration Search Twitter Analysis Office Tips Mobile Device Social Networking Data Management Digital Payment Document Management Credit Cards DDoS Paperless Office Video Surveillance Education Managed Service Solid State Drive Statistics Data loss Black Market IBM Fraud Skype Spam Blocking Instant Messaging Piracy CES Programming Wireless Physical Security Environment Cleaning Password Virtual Assistant Leadership IT Plan Human Resources Public Cloud Running Cable Augmented Reality Intranet SaaS Biometrics Computer Accessories Content Management Wearable Technology Unsupported Software Infrastructure Telephone System IT service Hacker OneNote Data storage Access Control Social Best Available Update eWaste Internet Exlporer Bluetooth Data Storage Smart Tech Keyboard PDF People Comparison Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Samsung Webinar Machine Learning Robot Touchscreen Safety Wi-Fi Government YouTube Online Currency Workers Meetings Point of Sale Voice over Internet Protocol Recycling HBO Cost Management Search Engine Travel Criminal NarrowBand IT Security Practices Customers Upgrades Addiction Analyitcs Virtual Private Network Mobile Cortana Uninterrupted Power Supply Print Server Accountants Business Technology Millennials Knowledge Wiring Webcam Wireless Charging Advertising nternet Crowdfunding FENG Enterprise Content Management Customer Service Multi-Factor Security Strategy Remote Support Consultant Proactive Frequently Asked Questions Distributed Denial of Service Files Patch Management Students Bing Chromecast Hosted Computing Workforce Company Culture 360 Emails Cache Project Management Professional Services Google Apps Law Firm IT Macro Screen Mirroring Devices GDPR Flash Fiber-Optic Notifications Co-managed IT Electronic Medical Records Cameras Password Management PC Care Lifestyle Licensing Inventory Remote Monitoring and Maintenance Scheduling Tip of the week Amazon Colocation LinkedIn Windows 10s Healthcare 3D Software as a Service Laptop Business Owner Telecommuting SharePoint Net Neutrality Wireless Internet Virtual Reality Warranty eBay Tools Shadow IT Charger Cast IoT WIndows 7 HIPAA Thought Leadership E-Commerce Sync Cables Hybrid Cloud Hiring/Firing Printer Server NIST Shortcut Alerts Windows 8.1 Update User Line of Business Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Worker Commute Electronic Health Records Touchpad Display Software Tips Remote Work Relocation Hosted Solution Wire Bloatware Microchip Text Messaging Password Manager Legal Debate Computer Care Managing Stress Domains Content Filter Science Camera Gaming Console Telephony Unified Communications Cryptocurrency Work Station Monitor Authentication MSP Online Shopping Audit Google Docs Staff Netflix Smart Office Entrepreneur Botnet Business Mangement Insurance Reputation Help Desk Storage Tablets Start Menu Theft Root Cause Analysis Safe Mode Data Warehousing Specifications Supercomputer Hiring/Firing Nanotechnology Remote Worker Regulations Evernote Internet exploMicrosoft Computer Fan Windows Media Player HVAC Virtual Desktop Digital Signature Emergency Video Games Music Worker Audiobook Congratulations Scalability Assessment Rootkit Politics Transportation How to Television Troubleshooting Webinar Techology Public Computer Benefits Automobile IT solutions Regulation Employer Employee Relationship CrashOverride Smart Technology Books Utility Computing Loyalty Experience Printers Content Two Factor Authentication Battery Thank You

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: