XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on XFER’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Business Computing Software Managed Service Provider Hosted Solutions Hackers Data Google Small Business Mobile Devices Hardware VoIP Productivity Mobile Office Gadgets Network Security Malware Email Quick Tips Efficiency Network IT Support Innovation Business Management IT Services Social Media Business Smartphones Business Continuity Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Communications Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Users Data Recovery Smartphone Mobile Device Management Passwords Browser Android Holiday Internet of Things Marketing Save Money WiFi Tech Term Outsourced IT Alert Ransomware Cloud Computing Artificial Intelligence Vendor Management Mobile Computing BDR Cybercrime Productivity Operating System Windows 10 Remote Monitoring Chrome Router Cybersecurity Automation Information Technology Avoiding Downtime Computers Bring Your Own Device Apple BYOD IT Solutions Going Green The Internet of Things Firewall VPN Health Current Events Telephone Systems Spam History Best Practice Collaboration Big Data Managed IT Services Remote Computing Printer Social Engineering Trending Facebook Employer-Employee Relationship Phone System Proactive IT Application Wireless Technology IT Consultant Hacking Office Windows 10 Mobility Money Budget IT Support Lithium-ion Battery Excel App Bandwidth Mobile Device How To Networking Unified Threat Management Business Managament Phishing Two-factor Authentication iPhone Fax Server Training Maintenance Mouse Private Cloud Windows 8 Recovery Content Filtering Business Intelligence Office 365 Applications Encryption Apps Website User Error File Sharing Google Drive Humor PowerPoint Gmail Outlook Managed IT Tutorials Sports Virus Settings Value Access Control Customer Relationship Management Hard Drives Data Protection Redundancy Information Blockchain Antivirus Law Enforcement Word Save Time Analytics Data Security Connectivity Social Networking Downtime Office Tips Digital Payment Computer Repair Memory Voice over Internet Protocol Compliance IT Management Flexibility Conferencing Servers Entertainment Administrator Retail Search Tablet Human Resources Twitter Wi-Fi Document Management Software as a Service Streaming Media Risk Management Network Congestion Hacker Social Machine Learning Inbound Marketing Data Management Vulnerability Tech Support Analysis Saving Time Scam Administration Managed Service Identity Theft Wireless Physical Security Workers Net Neutrality Cleaning Password Video Surveillance Public Cloud Best Available Credit Cards Display SaaS Virtual Assistant Data loss Bluetooth IBM People Data storage Healthcare Piracy Leadership Samsung Fraud Instant Messaging Telephone System CES Spam Blocking Internet Exlporer IT Plan Environment eWaste Webinar Computer Accessories Online Currency PDF Point of Sale Safety Biometrics Recycling HaaS End of Support Smart Tech Content Management YouTube Unsupported Software Education Government Infrastructure Help Desk IT service OneNote Statistics Meetings Update Skype Data Storage Programming DDoS Comparison Telephony Keyboard Touchscreen Solid State Drive USB Running Cable Black Market Windows 7 Paperless Office Work/Life Balance Data Breach Robot Augmented Reality Intranet Google Docs Wearable Technology Botnet Business Technology Data Warehousing Specifications Wiring Root Cause Analysis Co-managed IT Tablets Restore Data Start Menu Enterprise Content Management Theft Employee/Employer Relationship Digital Signature Computer Fan Hiring/Firing Digital Signage Regulations Students Evernote Bing Supercomputer Windows Media Player Virtual Desktop Windows 8.1 Update Notifications Hosted Computing Proactive Laptop HBO Cache Project Management Cost Management Colocation Travel Criminal Shadow IT Devices Millennials GDPR Upgrades Webcam Analyitcs Debate SharePoint Backup and Disaster Recovery Mobile Password Management Cortana Multi-Factor Security Remote Monitoring and Maintenance Strategy FENG Google Search Wireless Charging Shortcuts Knowledge Customer Service Hybrid Cloud Inventory Consultant Touchpad Frequently Asked Questions Wireless Internet Warranty IaaS Computing Infrastructure IoT Patch Management Legal Thought Leadership Workforce E-Commerce Screen Mirroring Relocation Professional Services NIST Google Apps 360 Emails PC Care Lifestyle Line of Business Electronic Medical Records Scheduling Monitor ISP Flash Electronic Health Records Fiber-Optic eCommerce Cameras 3D Licensing Tip of the week Wire Amazon Microchip Business Owner eBay Windows 10s Content Filter Telecommuting Camera Charger Cast Virtual Reality IT Security Tools Cryptocurrency WIndows 7 Alerts Authentication MSP Hiring/Firing Print Server Reputation File Versioning Sync Cables Vendor HIPAA Printer Server Shortcut User nternet Crowdfunding Smartwatch Windows Server 2008 Smart Office Amazon Web Services Worker Commute Text Messaging Remote Support Internet exploMicrosoft Insurance NarrowBand Software Tips Storage Remote Work Computer Care Gaming Console Bloatware Safe Mode Password Manager Hosted Solution Managing Stress Domains Work Station Nanotechnology Remote Worker Science Law Firm IT Customers Multiple Versions HVAC Unified Communications Security Cameras Company Culture Uninterrupted Power Supply Audit Employee Online Shopping Search Engine Advertising Practices Staff LinkedIn Chromecast Addiction Virtual Private Network Macro Entrepreneur Distributed Denial of Service Files Accountants Business Mangement Netflix Experience Two Factor Authentication Content How to Emergency Techology Worker Music Audiobook Assessment Rootkit Cryptomining Politics Television Regulation Transportation Troubleshooting Webinar Thank You Battery Utility Computing Automobile Public Computer Benefits Video Games Printers IT solutions Employer Employee Relationship CrashOverride Congratulations Smart Technology Scalability Loyalty Books

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *