window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Managed IT Services Hosted Solutions Hackers Malware Data Recovery Mobile Devices VoIP Google Email Data Outsourced IT User Tips Internet of Things Tech Term Innovation Communications Cloud Computing Backup Productivity Internet Microsoft IT Services Hardware Business Continuity Artificial Intelligence Saving Money Business BDR Cybersecurity Software Efficiency Smartphones Ransomware Communication Small Business Cybercrime Android Smartphone IT Support IT Support Managed IT Services Router Disaster Recovery Windows 10 Gadgets Applications Browser Chrome Workplace Tips Network Business Management Phishing Mobile Device Collaboration Law Enforcement How To Managed IT Computer Mobility Data Protection Training Windows Encryption Avoiding Downtime Office 365 Word Information Save Money Virtualization Access Control Business Intelligence Spam Blockchain Computers Mobile Device Management Server Money Two-factor Authentication Proactive IT Data Security BYOD Holiday Productivity Social Engineering Connectivity Document Management Voice over Internet Protocol Vulnerability Software as a Service Settings File Sharing Compliance Machine Learning App Remote Monitoring Miscellaneous Identity Theft Firewall Upgrade Facebook Social Media Servers Private Cloud Automation Managed Service Analysis Wi-Fi Bandwidth Passwords Alert IT Management Telephone Systems Redundancy Apps Workers Hacker Telephone System IT Plan Budget Keyboard Microsoft Office CES Sports Windows 7 Health Big Data Work/Life Balance Comparison OneNote Save Time Unsupported Software Employer-Employee Relationship Website Telephony Data Storage Content Management Google Drive Data Breach Flexibility Solid State Drive Password Scam Update Spam Blocking Information Technology Paperless Office Credit Cards Botnet Smart Tech Business Technology Value Operating System Human Resources Fraud Data loss Infrastructure Mobile Computing VPN Virtual Assistant Business Owner Google Docs Healthcare Education Bring Your Own Device Unified Threat Management Networking Recovery The Internet of Things Professional Services Remote Monitoring and Maintenance Password Manager End of Support Storage Data Management Marketing HBO Accountants HVAC Cables Smartwatch SaaS Warranty Digital Signature Electronic Health Records Sync Amazon Web Services Cast Cleaning E-Commerce PDF Current Events Remote Work Social Hosted Computing Office Tips Tools Line of Business Business Mangement File Versioning Outlook Technology Tips Search Engine Enterprise Content Management Unified Communications Employee Devices HaaS Users Multi-Factor Security Audit Printer webinar Online Shopping Vendor Inventory Patch Management Computer Care Government Camera Smart Office Risk Management Regulations Knowledge Root Cause Analysis Emails MSP Gmail Multiple Versions Addiction Frequently Asked Questions Specifications Bing IoT Password Management Theft Digital Signage Thought Leadership Software Tips Trending Mouse Strategy YouTube Skype Conferencing Evernote Display Virtual Reality Samsung Hard Drives Wireless Network Congestion Black Market Content Filtering Meetings Windows 10 Charger Remote Worker Recycling Restore Data Cache Excel Millennials Downtime Help Desk NIST Start Menu Wireless Charging Google Apps Computing Infrastructure Google Search Streaming Media Hacking Physical Security Lifestyle Computer Fan Administrator Instant Messaging Security Cameras Authentication Worker Commute Data Warehousing WiFi Virtual Private Network Students HIPAA Electronic Medical Records Flash IT Consultant Battery Travel Wiring eWaste Public Cloud Backup and Disaster Recovery Wireless Internet Legal Entertainment Tip of the week Workforce Shortcuts Insurance Cryptocurrency USB Mobile Augmented Reality Proactive Content Filter FENG Cortana Microchip Fiber-Optic Employee/Employer Relationship Nanotechnology Windows 10s Project Management Staff Remote Computing Wireless Technology Leadership Amazon Screen Mirroring Netflix Managed Service Provider GDPR Criminal Wire Windows Server 2008 Telecommuting eCommerce Practices Safe Mode Troubleshooting Rootkit ISP Utility Computing Smart Technology Hiring/Firing Scalability Employer Employee Relationship Emergency Customer Relationship Management Competition Shadow IT Hosted Solution Fun Internet exploMicrosoft Twitter IP Address Quick Tips Regulation Experience Computer Accessories Customer Service Two Factor Authentication Files Vendor Management Advertising Content Mobile Office CrashOverride Office Colocation Assessment Music Domains Bluetooth History Printers Politics Webinar Search Audiobook Relocation Television Company Culture Wearable Technology Public Speaking Techology Transportation Video Games Presentation Books IT solutions Lithium-ion battery Humor Worker Internet Exlporer Net Neutrality Automobile Public Computer Managing Stress How to User Error Benefits Tech Support Loyalty 5G IBM Hybrid Cloud Best Practice Safety

Mobile? Grab this Article!

QR-Code dieser Seite