(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Managed IT Services Network Security Privacy Business Computing Hackers Data Backup Malware VoIP Hosted Solutions Email Microsoft Outsourced IT Data Recovery Backup Mobile Devices Google Software Cloud Computing Saving Money Business Continuity Data Tech Term Internet of Things IT Support Internet Cybersecurity BDR Android Small Business Efficiency Innovation Cybercrime Disaster Recovery Communications Ransomware How To Communication Managed IT IT Services Smartphones Hardware Router Law Enforcement User Tips Business Money Collaboration BYOD Data Security Artificial Intelligence Computers Data Protection Managed IT Services Smartphone Business Intelligence Network Mobile Device Management Windows Two-factor Authentication Productivity Avoiding Downtime Business Management Browser Phishing Chrome Virtualization Document Management Alert Computer IT Support Redundancy Social Engineering Save Money Bandwidth Office 365 Remote Monitoring Vulnerability Compliance Mobility Spam Applications Apps Productivity Telephone Systems Connectivity Proactive IT Gadgets App Windows 10 Identity Theft Word Blockchain Smart Tech Credit Cards Servers Mobile Device Data Breach Server Wi-Fi Data loss Spam Blocking Infrastructure Passwords Value Operating System Microsoft Office Networking Comparison Website Workers Facebook Flexibility Data Storage Information Technology Access Control Education Update Firewall Analysis Work/Life Balance VPN IT Management CES Bring Your Own Device IT Plan Budget Windows 7 Big Data Content Management Employer-Employee Relationship Unsupported Software Solid State Drive Upgrade Business Owner Password OneNote Private Cloud Paperless Office Social Media Holiday Recovery webinar Wireless NIST Computer Care Botnet Windows 10 Streaming Media Google Apps Human Resources Lifestyle Public Cloud Scam Physical Security Students Insurance Conferencing Fraud Flash Cryptocurrency Samsung Travel Content Filter Save Time Risk Management Downtime Staff Automation Mobile Computing Cortana Healthcare Wireless Technology Practices Amazon Safe Mode Managed Service Provider USB Screen Mirroring Storage Password Manager Root Cause Analysis Digital Signature PDF HBO Hacker Electronic Health Records Marketing File Sharing Hosted Computing Black Market Amazon Web Services Sync HaaS Software as a Service Cast Hacking Windows 10s Business Mangement HIPAA Meetings Encryption Technology Tips Google Drive Outlook Machine Learning Business Technology Inventory Battery Online Shopping Telephony SaaS Government Addiction Gmail Strategy Remote Computing Current Events Specifications Frequently Asked Questions YouTube Virtual Assistant Evernote Training Skype Hard Drives Computing Infrastructure Cache Data Management Audit Recycling Knowledge Millennials Excel Telephone System Authentication Emails Wireless Charging Start Menu Content Filtering Data Warehousing Wireless Internet eWaste Network Congestion Workforce Tip of the week Nanotechnology Fiber-Optic Charger Mobile Criminal Google Docs End of Support Wire Computer Fan Accountants Workplace Tips IT Consultant Telecommuting Electronic Medical Records Windows Server 2008 HVAC Professional Services Health The Internet of Things Virtual Reality Cables Office Tips Voice over Internet Protocol Sports FENG Leadership Remote Work Enterprise Content Management Tools Keyboard Devices Worker Commute Netflix Unified Communications Unified Threat Management Legal Multi-Factor Security Smart Office Users Entertainment IoT Regulations Password Management Cleaning Thought Leadership Settings Theft Trending Patch Management Software Tips Computer Accessories Techology Search Music CrashOverride Presentation Shadow IT Bluetooth User Error Wearable Technology Hybrid Cloud Transportation 5G IBM Politics Benefits Quick Tips Worker Loyalty Troubleshooting Customer Relationship Management Twitter Video Games Smart Technology IP Address Rootkit Colocation Hosted Solution Customer Service Automobile Office Mobile Office Domains Scalability Relocation Two Factor Authentication Company Culture Public Speaking Vendor Management Assessment WiFi Internet Exlporer Humor Lithium-ion battery Managing Stress Augmented Reality Webinar Television Books Tech Support Content Safety IT solutions Public Computer Hiring/Firing Internet exploMicrosoft Audiobook Competition Instant Messaging Fun Files Advertising Emergency How to Employer Employee Relationship Miscellaneous History Experience Best Practice

      Mobile? Grab this Article!

      QR-Code dieser Seite