window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Malware Email VoIP Data Hosted Solutions Outsourced IT Mobile Devices Data Recovery Tech Term Innovation Backup Internet Google Microsoft Software Cloud Computing Business Continuity Saving Money Internet of Things IT Services Ransomware Hardware Communication Small Business IT Support BDR User Tips Android Efficiency Cybersecurity Communications Smartphones Applications Browser Cybercrime Disaster Recovery Artificial Intelligence How To Network Gadgets Router Productivity Law Enforcement Managed IT Workplace Tips Business Managed IT Services Windows 10 Computer Data Protection Virtualization Phishing Chrome Smartphone Collaboration Money Windows BYOD Business Intelligence Save Money IT Support Computers Mobile Device Management Avoiding Downtime Business Management Data Security Two-factor Authentication Vulnerability Telephone Systems Passwords Blockchain Apps Mobility Training Document Management Analysis Server Productivity Identity Theft Compliance Alert Word Office 365 Miscellaneous Firewall Upgrade Information Connectivity Social Media Social Engineering Proactive IT Bandwidth Spam Remote Monitoring Redundancy App IT Management Facebook Business Owner Solid State Drive Virtual Assistant Flexibility Settings Paperless Office Information Technology Holiday Access Control Password IT Plan Education Bring Your Own Device Private Cloud Windows 7 OneNote Smart Tech Comparison Keyboard Telephone System Microsoft Office Mobile Device Budget Unsupported Software Work/Life Balance Data Breach Data Storage VPN Big Data Infrastructure Spam Blocking Website Servers Credit Cards Automation Update Scam Value Operating System CES Sports Fraud File Sharing Data loss Managed Service Mobile Computing Encryption Machine Learning Employer-Employee Relationship Unified Threat Management Content Management Wi-Fi Networking Workers HBO Project Management SaaS Strategy YouTube Augmented Reality Professional Services Remote Computing Theft Thought Leadership Cleaning Hard Drives Wireless Technology Sync Amazon Web Services Current Events Voice over Internet Protocol GDPR Recycling Cache Remote Work Data Management NIST Cast Software as a Service Recovery Remote Monitoring and Maintenance Outlook Warranty Audit The Internet of Things Tools webinar Google Apps Streaming Media Marketing Computing Infrastructure Hacker Computer Care Human Resources Students Telephony Online Shopping Knowledge Authentication Multi-Factor Security E-Commerce Emails eWaste Wireless Internet Public Cloud Regulations Insurance Cryptocurrency Government Line of Business Frequently Asked Questions Specifications Save Time Printer Cortana Root Cause Analysis Conferencing Content Filter Samsung Staff Healthcare Skype Evernote Risk Management Network Congestion Fiber-Optic Nanotechnology Users Software Tips Trending Patch Management Camera Charger Criminal Wire Managed Service Provider Downtime Practices Safe Mode MSP End of Support Excel Millennials Mouse Computer Fan Accountants HVAC Meetings Botnet Password Manager Storage Digital Signature Electronic Health Records Start Menu Wireless Charging Electronic Medical Records IT Consultant Cables Physical Security Lifestyle Virtual Reality PDF Wireless Flash Hosted Computing Health Office Tips Data Warehousing Black Market Content Filtering Remote Worker Tip of the week Workforce Hacking FENG Enterprise Content Management Technology Tips Windows 10 Travel Instant Messaging Business Mangement Worker Commute Virtual Private Network Windows 10s Mobile HIPAA Business Technology Leadership Unified Communications Devices HaaS Netflix Smart Office Google Drive Legal Amazon Entertainment Inventory Google Docs Battery Wiring Gmail Addiction Windows Server 2008 Telecommuting IoT Password Management Screen Mirroring USB Proactive Benefits Employer Employee Relationship Colocation 5G Best Practice History Tech Support Search Safety Relocation IBM Troubleshooting Smart Technology Company Culture Scalability Computer Accessories Two Factor Authentication Techology Emergency Vendor Management Competition CrashOverride Humor Customer Relationship Management Shadow IT Hosted Solution Internet Exlporer IP Address Assessment Managing Stress Experience Regulation Bluetooth User Error Webinar Hybrid Cloud Content Customer Service Mobile Office Television Music Printers Hiring/Firing Domains Politics IT solutions Audiobook WiFi Fun Internet exploMicrosoft Public Computer Quick Tips Wearable Technology Worker Twitter Transportation Loyalty Public Speaking Video Games Presentation Files Books Advertising Lithium-ion battery Automobile Office How to Rootkit

Mobile? Grab this Article!

QR-Code dieser Seite