window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 10 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Business Computing Managed IT Services Data Backup Hackers Hosted Solutions Data Recovery Malware Email VoIP Data Innovation Mobile Devices Outsourced IT Microsoft Tech Term Google User Tips Backup Business Continuity Hardware Internet Cloud Computing Saving Money Business Internet of Things BDR Software Efficiency Communications IT Services Ransomware Cybersecurity IT Support Managed IT Services Smartphones Cybercrime Android Communication Small Business Network Applications Disaster Recovery Artificial Intelligence Chrome Workplace Tips Productivity Browser Smartphone Business Management Windows 10 Router Law Enforcement Managed IT Computer How To Gadgets IT Support Office 365 Business Intelligence Server Blockchain Money Collaboration BYOD Windows Spam Mobile Device Management Phishing Data Security Two-factor Authentication Save Money Data Protection Computers Information Avoiding Downtime Virtualization Word Telephone Systems Servers Bandwidth Holiday Proactive IT Miscellaneous Mobility Analysis Document Management Upgrade Mobile Device Alert Social Media Compliance Vulnerability Redundancy IT Management Social Engineering Training Firewall Connectivity Voice over Internet Protocol Passwords Software as a Service App Apps Remote Monitoring Encryption Productivity Facebook Identity Theft Business Owner Private Cloud Big Data Value Operating System Education Bring Your Own Device Credit Cards Website Access Control Update Paperless Office Smart Tech Virtual Assistant Keyboard Fraud Networking Unified Threat Management Human Resources Work/Life Balance Telephone System Data loss Workers VPN Infrastructure Mobile Computing Google Docs Settings OneNote Wi-Fi Scam IT Plan Windows 7 Data Breach File Sharing Employer-Employee Relationship CES Sports Google Drive Comparison Machine Learning Telephony Unsupported Software Spam Blocking Automation Flexibility Microsoft Office Managed Service Data Storage Solid State Drive Content Management Budget Password Information Technology Strategy YouTube Shortcuts Skype Evernote Electronic Medical Records IT Consultant Theft Thought Leadership Remote Computing Wiring Software Tips Trending Microchip Computing Infrastructure Proactive Users Excel Millennials FENG NIST Data Management Meetings Botnet Recycling Cache Recovery Project Management Start Menu Wireless Charging Leadership Public Cloud Google Apps Streaming Media GDPR Physical Security Lifestyle Windows 10s Flash Authentication Remote Monitoring and Maintenance Data Warehousing WiFi Netflix Cortana Students Tip of the week Workforce Insurance Wireless Cryptocurrency Travel eWaste Wireless Internet Warranty Save Time Mobile Managed Service Provider Windows 10 Content Filter E-Commerce SaaS Patch Management Search Engine Amazon Current Events End of Support Fiber-Optic Nanotechnology Risk Management Line of Business Cleaning Staff Healthcare Printer Windows Server 2008 Telecommuting Practices Safe Mode Screen Mirroring Criminal Wire Audit Health Office Tips Accountants HVAC Professional Services webinar PDF Password Manager Storage Camera HBO Electronic Health Records Virtual Reality Bing Sync Amazon Web Services Knowledge Cables Augmented Reality MSP Computer Care Technology Tips Digital Signature Mouse Remote Work HaaS Wireless Technology Hosted Computing Cast Emails Black Market Content Filtering Enterprise Content Management Hacking Tools Conferencing Business Mangement Instant Messaging Outlook Marketing Hacker Worker Commute Help Desk Online Shopping Network Congestion Unified Communications The Internet of Things Devices HIPAA Remote Worker Multi-Factor Security Samsung Battery Administrator Regulations Downtime Inventory Legal Entertainment Government Charger Smart Office Specifications Computer Fan IoT Password Management Business Technology Root Cause Analysis Hard Drives Gmail Addiction USB Virtual Private Network Frequently Asked Questions IP Address Benefits Search Relocation Best Practice IT solutions Public Computer Techology Worker Customer Service Troubleshooting Humor Mobile Office Company Culture Smart Technology Scalability Loyalty Emergency Utility Computing Internet Exlporer Domains User Error Rootkit Shadow IT Hosted Solution Managing Stress Employer Employee Relationship Hybrid Cloud Experience Public Speaking Presentation Content Regulation Hiring/Firing Lithium-ion battery Computer Accessories Music Two Factor Authentication Fun Internet exploMicrosoft Politics Quick Tips CrashOverride 5G Audiobook Vendor Management Tech Support Assessment Files Safety Bluetooth IBM Twitter Wearable Technology Printers Transportation Advertising Video Games Office Books Colocation Webinar Television History Competition Automobile Customer Relationship Management How to

Mobile? Grab this Article!

QR-Code dieser Seite