Contact us today!

Network Solutions Unlimited Blog

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Understanding VPNFilter
VPNFilter is a malware that hides in your router and remains even if you restart the device. VPNFilter is known for prioritizing devices in Ukraine, but you should never count on the trend to protect you from known threats. It’s thought that the VPNFilter malware has its roots in a group called Sofacy, and the malware operates in three basic steps.

The first step for this malware is that it installs itself on the device and remains there even in the event that the router is rebooted or turned off. Second, the malware will install certain permissions on the router that allows it to change settings, manage files, and execute commands. The router can then proceed to brick itself, making it much more difficult for your organization to keep operations moving along. In its final stages, this malware lets a hacker see the data packets that are being sent to and from your organization’s device, meaning that they can then also issue commands and communicate with the device via a Tor web browser.

This threat was specifically mentioned by the FBI because of its persistence. While resetting the device will disable the second and third steps, the first will remain, creating an endless cycle if you don’t do anything about it.

Is Your Router Affected?
Even though not all routers are affected, the number is still quite considerable. Here is a list of affected brands:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you would like a more comprehensive list of all affected devices, Symantec has a list on their website:

How You Fix It
There is an easy fix to VPNFilter, and it’s to perform a factory reset on your router. This eliminates anything that’s currently installed from the first stage of VPNFilter’s attack. Of course, it’s also worth mentioning that the manufacturer of the router may have also administered a patch or security update resolving the vulnerability, so be sure to check for that as well so that it will never be an issue again.

For more great updates and tech tips, be sure to subscribe to Network Solutions Unlimited’s blog.

Tip of the Week: Changing Your Network Profile
Why (and How) SMBs Should Strategically Adopt Tech...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Sports Work/Life Balance Spyware Connectivity Audiobook Smart Technology hacker Analysis Patch Management Computer Accessories Updates Root Cause Analysis Windows Computers IoT Safety Computer Forensics Scam Health Politics Legislation CrashOverride Books Meetings Wireless Internet Recovery Disaster Recovery Password Education How to Network Testing Battery iOS Data Quick Tips Passwords Settings Gmail Virtual Assistant Thank You Communications Loyalty Project Management Google Charger Money HaaS Vendor Management Network Security Printing Virus Managed IT Service Flexibility Business Intelligence PDF Tech Term Data Loss IT budget Remote Monitoring Proactive Networking Emergency Congratulations Data Theft Techology Professional Services Wasting Money PowerPoint Rootkit Cloud Computing Conferencing eWaste Lifestyle IT solutions FAQ Twitter Sync Mobile Devices Update Managing Stress Emails Identities Hosted Solution Small Business Facebook Data Protection NFL Unsupported Software Fraud Business Owner Identity Theft Private Cloud Business Computing Server Amazon Excel Internet Cast Business Management Business Continuity Hybrid Cloud User Error Legal Social Engineering Colocation Outlook Employer Employee Relationship Gadgets User Tips File Storage Privacy Microsoft Excel BYOD The Internet of Things Camera Spam Blocking Projects Webinar Black Market Applications Government Productivity Gamification Consultant Business Communication Office Risk Management Cost Management Websites Cortana Redundancy Mobile Upgrades Administration Windows Ink Avoiding Downtime Innovation Printers Save Time Information Office Tips Hard Disk Drive Ransomware Commerce Instant Messaging Document Management Tip of the Week Reputation Memory Employer-Employee Relationship Touchpad Personal Information Productivity Smartphones Samsung Efficiency Tech Support Assessment Firewall IT Support VoIP Telephone Systems Screen Mirroring Holiday Hiring/Firing Hard Drives Microsoft Word Apple Phone System Files Device Security Keyboard WiFi Android Wireless Charging Gifts Maintenance Technology Best Practices Workplace Tips Microsoft Virtualization Devices Data Storage Evernote Automobile SaaS File Sharing Email Sales IT Support Application iPhone Scalability Cache Content Streaming Media Regulation Managed Service Bluetooth Chromecast Employee-Employer Relationship Bandwidth Identity Chrome Windows 10 Content Filter Computing intranet Bring Your Own Device Internet of Things Miscellaneous Hardware Customer Electronic Medical Records VPN Shadow IT Word Financial Technology Users Software Wi-Fi Data Breach OneNote HBO App Augmented Reality Alert Data Backup Solid State Drive App store Social Media Entertainment USB Backup Managed IT Business Technology Monitoring End of Support Data storage Managed IT Services Google Docs Windows 10 Data Management Cybercrime Google Assistant Workers Phishing WannaCry WPA3 Microsoft Office Data Privacy Proactive IT Hosted Solutions Two Factor Authentication Mobile Security Smartphone Content Filtering WIndows Server 2008 Edge Remote Computing Compliance Managed Service Provider IT Services Collaboration Google Maps Two-factor Authentication Blockchain Data Recovery Artificial Intelligence Office 365 Audit Upgrade MSP Big Data Worker Dark Web Experience Save Money Alexa for Business Computer Fan Outsourced IT HIPAA Transportation Downtime Apps Computing Infrastructure Google Drive Television Software as a Service Chromebook Spam Retail Hard Drive Value IT Management Laptop Going Green Data Security Windows 10s Wireless Technology Unified Threat Management Management Budget Language Router Vendor Security Cleaning Specifications Search Virtual Reality Law Enforcement History Hacking Marketing Internet exploMicrosoft Humor Encryption Cloud Best Practice Browser Managed IT Services Storage Worker Commute Mobile Device Management Licensing Students Touchscreen Physical Security Unified Communications Monitors Monitor Mobile Device IT Solutions Tablets Credit Cards Hackers Adobe Travel Comparison Financial Automation Advertising Robot How To Video Games Benefits Wireless Computer Care Internet Exlporer Nanotechnology Saving Money BDR Smart Tech Malware Mobility Operating System Company Culture Public Cloud Antivirus Ciminal Relocation Vulnerability Troubleshooting Information Technology Public Computer Computer Shortcut Training Cybersecurity