Contact us today!
217-428-6449

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Understanding VPNFilter
VPNFilter is a malware that hides in your router and remains even if you restart the device. VPNFilter is known for prioritizing devices in Ukraine, but you should never count on the trend to protect you from known threats. It’s thought that the VPNFilter malware has its roots in a group called Sofacy, and the malware operates in three basic steps.

The first step for this malware is that it installs itself on the device and remains there even in the event that the router is rebooted or turned off. Second, the malware will install certain permissions on the router that allows it to change settings, manage files, and execute commands. The router can then proceed to brick itself, making it much more difficult for your organization to keep operations moving along. In its final stages, this malware lets a hacker see the data packets that are being sent to and from your organization’s device, meaning that they can then also issue commands and communicate with the device via a Tor web browser.

This threat was specifically mentioned by the FBI because of its persistence. While resetting the device will disable the second and third steps, the first will remain, creating an endless cycle if you don’t do anything about it.

Is Your Router Affected?
Even though not all routers are affected, the number is still quite considerable. Here is a list of affected brands:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you would like a more comprehensive list of all affected devices, Symantec has a list on their website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How You Fix It
There is an easy fix to VPNFilter, and it’s to perform a factory reset on your router. This eliminates anything that’s currently installed from the first stage of VPNFilter’s attack. Of course, it’s also worth mentioning that the manufacturer of the router may have also administered a patch or security update resolving the vulnerability, so be sure to check for that as well so that it will never be an issue again.

For more great updates and tech tips, be sure to subscribe to Network Solutions Unlimited’s blog.

Tip of the Week: Changing Your Network Profile
Why (and How) SMBs Should Strategically Adopt Tech...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Colocation Proactive Fraud MSP Spam Blocking Licensing Value Root Cause Analysis Chrome Mobility NFL Miscellaneous Browser Workers Business Owner Nanotechnology Google Assistant Samsung Wireless Charging BDR Specifications Ransomware Office 365 CrashOverride Advertising Thank You Unsupported Software Tip of the Week Business Computing Artificial Intelligence Television Electronic Medical Records Alert Screen Mirroring Analysis Managed IT Services Backup WiFi Connectivity Data Recovery Smartphone iOS Worker Mobile Devices Hardware Hiring/Firing Spyware Entertainment Legal Going Green Emergency Mobile Device Computing Antivirus Holiday Financial Technology WannaCry Law Enforcement Technology Government Vulnerability Facebook Computer Accessories Legislation Managed IT Data storage How To Windows 10 Windows Ink Windows 10s Assessment Phone System Data Breach Politics Server Books Scam Content Monitoring Document Management Productivity Physical Security Device Security Websites Wireless User Tips Email Cloud Computing Collaboration Search Shadow IT Black Market Proactive IT Security Laptop End of Support Retail Identity Theft Firewall Charger Internet of Things Content Filter Hard Drive Budget Evernote Mobile Security Gifts Best Practice Flexibility IT Services Update Work/Life Balance Application Save Money Travel Gmail Android Files Hosted Solution User Error intranet HIPAA Amazon SaaS Smart Technology Vendor Management Tech Term Software Saving Money Automation Alexa for Business Virus Cache Hosted Solutions IT Solutions Settings Video Games Cleaning VPN Streaming Media Big Data Apps Students IoT Password Gadgets Bluetooth FAQ Data Storage Meetings BYOD Bring Your Own Device Privacy Workplace Tips Network Private Cloud Devices Rootkit Office IT budget Computer Fan Remote Computing Touchscreen Worker Commute Communications Shortcut Efficiency Word Cost Management Storage Data PowerPoint Adobe Data Privacy Hacking Cloud Employer Employee Relationship Comparison Network Security Information Technology Google Docs Maintenance Business Intelligence Cybersecurity Social Media Computing Infrastructure Windows Passwords Techology Instant Messaging Scalability Sync Redundancy USB Emails Productivity Marketing Customer Gamification File Sharing Disaster Recovery Blockchain Professional Services Computer Audiobook Hard Disk Drive Malware Twitter WIndows Server 2008 Automobile Money Commerce Monitors Tablets Mobile Audit Loyalty Lifestyle Computer Care iPhone Congratulations Regulation Content Filtering Hard Drives Phishing Excel Telephone Systems Managed IT Services Identities Upgrade Information Printing Data Protection Internet Exlporer Experience Education Dark Web Company Culture Financial Data Backup IT solutions OneNote Google Maps Smartphones Cortana Tech Support Health Data Theft Managed IT Service Wireless Internet Credit Cards App store How to Identity Smart Tech Best Practices Consultant Reputation IT Support hacker Sports Public Cloud Two Factor Authentication Business Technology Upgrades IT Support Innovation App Chromecast HaaS Keyboard Mobile Device Management Data Loss Wireless Technology Managing Stress Cast Internet exploMicrosoft Outlook Computers Internet Personal Information Wi-Fi Training Apple Windows 10 Networking HBO Software as a Service Business Communication Patch Management Unified Communications VoIP Two-factor Authentication The Internet of Things Updates Hybrid Cloud Compliance Language Data Management Applications Operating System Monitor Remote Monitoring Battery Computer Forensics Managed Service Provider Relocation Virtual Reality Ciminal Conferencing Social Engineering Hackers Business Management Augmented Reality Robot Recovery Small Business Virtualization Unified Threat Management PDF Avoiding Downtime Humor Management Sales Solid State Drive Downtime IT Management Microsoft Excel Bandwidth Save Time Google Touchpad Outsourced IT Quick Tips Google Drive Users Router Transportation eWaste Office Tips Encryption Webinar Microsoft Word Edge Memory Data Security Project Management Troubleshooting Spam Business Continuity Chromebook Employer-Employee Relationship Administration Public Computer Cybercrime Microsoft Office Safety Wasting Money History Microsoft Virtual Assistant Benefits Risk Management