Contact us today!

Network Solutions Unlimited Blog

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Understanding VPNFilter
VPNFilter is a malware that hides in your router and remains even if you restart the device. VPNFilter is known for prioritizing devices in Ukraine, but you should never count on the trend to protect you from known threats. It’s thought that the VPNFilter malware has its roots in a group called Sofacy, and the malware operates in three basic steps.

The first step for this malware is that it installs itself on the device and remains there even in the event that the router is rebooted or turned off. Second, the malware will install certain permissions on the router that allows it to change settings, manage files, and execute commands. The router can then proceed to brick itself, making it much more difficult for your organization to keep operations moving along. In its final stages, this malware lets a hacker see the data packets that are being sent to and from your organization’s device, meaning that they can then also issue commands and communicate with the device via a Tor web browser.

This threat was specifically mentioned by the FBI because of its persistence. While resetting the device will disable the second and third steps, the first will remain, creating an endless cycle if you don’t do anything about it.

Is Your Router Affected?
Even though not all routers are affected, the number is still quite considerable. Here is a list of affected brands:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you would like a more comprehensive list of all affected devices, Symantec has a list on their website:

How You Fix It
There is an easy fix to VPNFilter, and it’s to perform a factory reset on your router. This eliminates anything that’s currently installed from the first stage of VPNFilter’s attack. Of course, it’s also worth mentioning that the manufacturer of the router may have also administered a patch or security update resolving the vulnerability, so be sure to check for that as well so that it will never be an issue again.

For more great updates and tech tips, be sure to subscribe to Network Solutions Unlimited’s blog.

Tip of the Week: Changing Your Network Profile
Why (and How) SMBs Should Strategically Adopt Tech...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Storage Alert Chromebook Keyboard Shortcuts Health Wi-Fi Avoiding Downtime Robot Content Testing Device Security Thank You Spam Blocking Smart Technology Fraud Microsoft Excel Managed IT Emails Managed IT Service Files Workplace Tips Risk Management Mobile Personal Information Meetings intranet The Internet of Things Save Time Google Commerce Business Technology Blockchain Wireless Internet Data Security Marketing Financial Gadgets Computing IT Services Reputation Microsoft Encryption Retail Business Owner Telephone Systems Google Assistant IT budget Virtual Assistant Financial Technology Business Intelligence NFL Office Android Keyboard Webinar Hybrid Cloud Co-Managed Services Search Computer Forensics Techology Windows Project Management Cloud Managed Service Provider Hardware Identities IT Solutions Windows 10s Data Backup BYOD Training Smartphone Save Money Peripheral CrashOverride Apple Document Management Data Breach Server Customer Data Company Culture Unified Communications Humor Information USB Cleaning Mobility Consultant MSP Sync Tablets Printers Private Cloud Audiobook BDR Touchpad Information Technology Backup Video Games Excel Two-factor Authentication Communication Advertising Quick Tips WIndows Server 2008 Business User Error Data Storage Worker Employer Employee Relationship Wireless Charging Hyperlink Small Business Network Security Monitors Antivirus Outlook Windows 10 Unified Threat Management HIPAA Colocation Tech Term Spyware Compliance Administration Password Saving Time Productivity WPA3 Comparison Office 365 OneNote Business Continuity Instant Messaging Public Cloud Hiring/Firing VoIP Collaboration iPhone Data Privacy Wasting Money Cybercrime Apps Legislation Politics Wireless Technology Cast Data Management Google Maps Solid State Drive Computer IT Support Money File Sharing FAQ End of Support Twitter Cloud Computing Firewall Cybersecurity Unsupported Software Transportation Data Recovery Black Market Memory Management Monitoring IT solutions Gifts History Content Filter Social Media Automation Charger Facebook Monitor Tip of the Week Language Value Efficiency Managed IT Services Battery IoT Computer Fan Managing Stress How to Access Control Hosted Solutions Bring Your Own Device Shortcut Remote Computing Rootkit Automobile Specifications Big Data Browser Miscellaneous Root Cause Analysis Samsung Content Filtering Disaster Recovery Outsourced IT Vendor Smart Tech Internet exploMicrosoft Internet of Things Entertainment Office Tips Identity Theft Data Theft Mobile Device Public Computer Software SaaS Loyalty Law Enforcement Devices Shadow IT Phishing Gamification Congratulations Internet Exlporer Productivity Wireless Holiday Printing Saving Money Students App store eWaste Electronic Medical Records VPN Networking Patch Management Hackers WannaCry Applications Redundancy Data Protection Computer Accessories Adobe Work/Life Balance Microsoft Word Screen Mirroring Business Management Dark Web Phone System Managed Service User Tips Chromecast Employer-Employee Relationship Going Green Cortana Websites Connectivity PDF Operating System Emergency Professional Services IT Support Google Docs Microsoft Office Regulation Artificial Intelligence Chrome Budget Projects Identity Lifestyle Update Settings Worker Commute Sales Hosted Solution Virus Touchscreen Travel IT Management Safety Network Cache Employee-Employer Relationship Experience HBO Router Vulnerability Amazon Scam Privacy Upgrades WiFi Mobile Devices Telephone Proactive Alexa for Business Tech Support Physical Security Security Troubleshooting Display Laptop Maintenance Managed IT Services Two Factor Authentication Scalability Television Best Practice Books Hard Drive Data Loss Computer Care Flexibility Social Engineering Technology Analysis Data storage Bluetooth Conferencing Remote Monitoring Assessment Legal Camera App Government Passwords Admin Innovation Communications Mobile Security Users Licensing Proactive IT HaaS Malware Email Updates Bandwidth Credit Cards Augmented Reality How To Hacking Benefits Upgrade Hard Disk Drive hacker Mobile Device Management Internet Spam Education iOS Gmail Relocation Accessory Audit Recovery Smartphones Edge Computing Infrastructure Hard Drives Streaming Media Evernote Virtual Reality Google Drive Computers Nanotechnology Wasting Time Cost Management Workers Application Virtualization Windows Ink Sports Windows 10 Best Practices File Storage Ciminal Ransomware Software as a Service Windows 7 Downtime Business Computing Vendor Management Word PowerPoint Utility Computing