window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Privacy Managed IT Services Network Security Business Computing Data Backup Email Hackers Malware VoIP Hosted Solutions Outsourced IT Data Recovery Tech Term Backup Mobile Devices Microsoft Google Data Software Cloud Computing Business Continuity Innovation Saving Money Internet of Things BDR Cybersecurity Efficiency Hardware Android Internet Small Business IT Support User Tips Disaster Recovery Smartphones Cybercrime Communications IT Services Ransomware Network Applications Router Business Artificial Intelligence Managed IT Services Law Enforcement Managed IT Communication How To Gadgets Money Productivity Collaboration IT Support BYOD Windows Mobile Device Management Business Management Business Intelligence Two-factor Authentication Computers Avoiding Downtime Phishing Data Security Virtualization Chrome Smartphone Browser Data Protection Office 365 Mobility Document Management Alert Identity Theft Social Media Word Proactive IT Blockchain Spam Compliance Bandwidth Social Engineering Analysis Save Money Computer Windows 10 App Remote Monitoring Vulnerability Passwords Facebook Apps IT Management Productivity Redundancy Connectivity Telephone Systems Holiday IT Plan Education Big Data Bring Your Own Device Information Website Spam Blocking Windows 7 Encryption Machine Learning Miscellaneous Comparison Content Management Automation Mobile Device Unsupported Software Upgrade Data Storage Value Operating System Work/Life Balance Access Control Paperless Office Smart Tech Update Firewall Servers Credit Cards Wi-Fi Networking Workers Employer-Employee Relationship Infrastructure VPN Data loss Training Flexibility Solid State Drive OneNote Password Information Technology Microsoft Office Private Cloud Budget File Sharing CES Business Owner Server Data Breach Enterprise Content Management Conferencing MSP Voice over Internet Protocol Business Mangement Sync Amazon Web Services Network Congestion Cast Software as a Service Unified Communications Recovery Devices Samsung Public Cloud Remote Work Users Data Management Tools Inventory Keyboard Charger Outlook Smart Office Cortana Downtime IoT Password Management Multi-Factor Security Gmail Addiction Computer Fan Telephony Online Shopping Electronic Medical Records IT Consultant Managed Service Government Theft Thought Leadership Managed Service Provider Regulations Strategy YouTube Business Technology Root Cause Analysis Wireless End of Support Frequently Asked Questions Specifications Save Time Risk Management NIST Software Tips Trending Recycling Cache Windows 10 Patch Management FENG Skype Evernote Health Leadership Office Tips Proactive Google Apps Streaming Media PDF Windows 10s Virtual Assistant Meetings Botnet Workplace Tips Authentication Unified Threat Management Netflix Excel Millennials Human Resources Students Technology Tips Insurance Cryptocurrency HaaS Physical Security Lifestyle eWaste Virtual Reality Wireless Internet Scam Start Menu Wireless Charging Remote Monitoring and Maintenance Data Warehousing Black Market Content Filter Content Filtering Augmented Reality SaaS Google Drive Flash Fraud Telephone System Travel Fiber-Optic Instant Messaging Nanotechnology Wireless Technology Cleaning Settings Tip of the week Workforce Staff Hacking Healthcare Current Events Practices HIPAA Safe Mode Mobile Computing Criminal Worker Commute Wire Mobile Entertainment HVAC Hacker webinar Line of Business Google Docs Password Manager Battery Storage The Internet of Things Hard Drives Audit Amazon Legal Accountants Marketing Knowledge Screen Mirroring Cables USB Computer Care Windows Server 2008 Telecommuting Digital Signature Electronic Health Records Professional Services Remote Computing Hosted Computing Computing Infrastructure Emails HBO Sports Best Practice IP Address Bluetooth Techology Twitter Assessment Humor Troubleshooting Scalability Internet Exlporer Webinar Customer Service Smart Technology Mobile Office User Error Remote Worker Emergency Television Shadow IT Domains Hosted Solution Hybrid Cloud Experience IT solutions Worker Wiring Hiring/Firing Public Computer Public Speaking Loyalty Content Company Culture Presentation Music Fun Internet exploMicrosoft Quick Tips Politics Lithium-ion battery Rootkit Employer Employee Relationship Files WiFi Audiobook Managing Stress Wearable Technology 5G Advertising Tech Support Office Video Games Safety Colocation IBM Transportation Computer Accessories History Books Regulation How to Search Automobile Two Factor Authentication Relocation Competition Vendor Management Customer Relationship Management Benefits CrashOverride

      Mobile? Grab this Article!

      QR-Code dieser Seite