window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Business Computing Managed IT Services Data Backup Hackers Data Recovery Malware Email Hosted Solutions VoIP Data Innovation Mobile Devices Outsourced IT Tech Term Google Backup Hardware Internet Microsoft User Tips Saving Money Business Continuity Business Internet of Things Cloud Computing Software BDR Ransomware Cybersecurity Communications IT Services IT Support Managed IT Services Smartphones Efficiency Communication Cybercrime Small Business Android Browser Productivity Network Disaster Recovery Artificial Intelligence Applications Chrome Workplace Tips IT Support Smartphone Business Management Router Windows 10 Computer How To Law Enforcement Managed IT Gadgets Computers Virtualization Business Intelligence Server Money Spam BYOD Data Security Mobile Device Management Phishing Two-factor Authentication Data Protection Collaboration Information Windows Avoiding Downtime Blockchain Save Money Word Analysis Servers Office 365 Miscellaneous Proactive IT Upgrade Bandwidth Social Media Telephone Systems Alert Connectivity Redundancy IT Management Mobility Vulnerability Document Management Social Engineering Training Encryption Passwords Compliance Apps Productivity Firewall App Remote Monitoring Identity Theft Facebook Solid State Drive Spam Blocking Scam Flexibility Smart Tech Information Technology Big Data Virtual Assistant Password Automation Website Credit Cards Update Private Cloud Value Operating System Infrastructure Telephone System VPN Fraud Data loss Business Owner Holiday Unified Threat Management Education Bring Your Own Device Networking Mobile Computing Workers Wi-Fi Keyboard CES Sports File Sharing Mobile Device Settings Machine Learning OneNote IT Plan Voice over Internet Protocol Work/Life Balance Windows 7 Content Management Comparison Employer-Employee Relationship Managed Service Data Breach Unsupported Software Microsoft Office Paperless Office Data Storage Budget Access Control Frequently Asked Questions Specifications Microchip Recycling Cache Samsung Root Cause Analysis Virtual Reality Proactive NIST Network Congestion Hard Drives Project Management Google Apps Streaming Media Charger Skype Evernote Black Market Content Filtering Downtime Software Tips Trending Instant Messaging Human Resources Students Computer Fan Users Hacking GDPR Authentication Excel Millennials HIPAA eWaste Wireless Internet Meetings Botnet Worker Commute Computing Infrastructure Remote Monitoring and Maintenance Insurance Cryptocurrency Electronic Medical Records IT Consultant Legal Entertainment Warranty Content Filter Start Menu Wireless Charging Battery Physical Security Lifestyle Fiber-Optic Nanotechnology Flash USB Staff Healthcare FENG Data Warehousing WiFi Public Cloud E-Commerce Tip of the week Workforce Wireless Remote Computing Cortana Search Engine Criminal Wire Windows 10s Travel Line of Business Practices Safe Mode Leadership Printer Password Manager Storage Netflix Mobile Windows 10 Accountants HVAC Cables Amazon Recovery Digital Signature Electronic Health Records Google Docs Data Management Managed Service Provider Camera Windows Server 2008 Telecommuting Bing SaaS Screen Mirroring End of Support MSP Hosted Computing Mouse Business Mangement Cleaning Professional Services Enterprise Content Management Current Events HBO Unified Communications Devices Sync Amazon Web Services Augmented Reality Health Office Tips PDF webinar Wireless Technology Remote Work Technology Tips Help Desk Smart Office Audit Cast Software as a Service Save Time Remote Worker Inventory Outlook Risk Management Administrator Gmail Addiction Computer Care Tools Patch Management HaaS IoT Password Management Knowledge Google Drive Virtual Private Network Theft Thought Leadership Emails Telephony The Internet of Things Online Shopping Business Technology Strategy YouTube Marketing Multi-Factor Security Hacker Conferencing Regulations Government Wiring Competition Politics Customer Relationship Management Colocation Audiobook Webinar History Company Culture IP Address Wearable Technology Relocation Television Search Video Games Utility Computing Customer Service Transportation IT solutions Books Techology Managing Stress Mobile Office Worker Domains How to Humor Public Computer Automobile Loyalty Benefits Internet Exlporer Best Practice User Error Regulation Rootkit Public Speaking Troubleshooting Hybrid Cloud Employer Employee Relationship Presentation Scalability Smart Technology Lithium-ion battery Hiring/Firing Twitter Emergency Shadow IT Hosted Solution Printers Computer Accessories 5G Experience Quick Tips Tech Support Fun Internet exploMicrosoft Safety IBM Two Factor Authentication Vendor Management Files CrashOverride Content Bluetooth Music Office Assessment Advertising

Mobile? Grab this Article!

QR-Code dieser Seite