window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on TaylorWorks’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Data Recovery Mobile Devices VoIP Email Data Google User Tips Outsourced IT Innovation Internet of Things Tech Term Backup Communications Internet Cloud Computing Microsoft Productivity Business Continuity Hardware IT Services Software Cybersecurity Saving Money Efficiency Business Artificial Intelligence BDR Ransomware Smartphones Communication Small Business IT Support Smartphone IT Support Managed IT Services Router Disaster Recovery Cybercrime Android Workplace Tips Gadgets Browser Network Business Management Windows 10 Chrome Applications Phishing Mobile Device Collaboration How To Computer Law Enforcement Managed IT Virtualization Save Money Blockchain Data Protection Access Control Computers Server Proactive IT Money Office 365 Word BYOD Business Intelligence Holiday Mobility Spam Training Mobile Device Management Information Windows Two-factor Authentication Encryption Avoiding Downtime Data Security Automation Apps Productivity Voice over Internet Protocol Software as a Service Analysis Private Cloud Bandwidth Identity Theft Alert Miscellaneous Upgrade Telephone Systems Social Media Vulnerability Servers Connectivity Settings Document Management Social Engineering File Sharing Wi-Fi Machine Learning Compliance IT Management App Passwords Remote Monitoring Redundancy Managed Service Facebook Firewall Business Technology Solid State Drive Paperless Office Flexibility Scam IT Plan Password Hacker Smart Tech Information Technology Microsoft Office Budget Value Operating System Windows 7 Virtual Assistant Human Resources Comparison Telephony Big Data Unsupported Software Website Infrastructure Data Storage VPN Networking Telephone System Healthcare Unified Threat Management Business Owner Workers Update Credit Cards Education Bring Your Own Device Botnet CES Sports Keyboard OneNote Health Fraud Data loss Work/Life Balance Employer-Employee Relationship Save Time Content Management Mobile Computing Data Breach Google Docs Google Drive Spam Blocking Downtime Security Cameras Professional Services Charger Virtual Private Network HBO Sync Amazon Web Services Virtual Reality The Internet of Things Recycling Cache Wiring Backup and Disaster Recovery Marketing NIST Computer Fan Shortcuts Hard Drives Google Apps Streaming Media Electronic Medical Records IT Consultant Proactive Cast Microchip Remote Work Black Market Content Filtering Authentication Employee/Employer Relationship Tools Hacking Students Project Management Computing Infrastructure Outlook Instant Messaging Online Shopping Worker Commute eWaste Wireless Internet GDPR Multi-Factor Security HIPAA Insurance Cryptocurrency FENG eCommerce Content Filter Leadership Remote Monitoring and Maintenance Government Legal Entertainment Users Windows 10s Public Cloud Regulations Battery Fiber-Optic Nanotechnology Smartwatch Cortana Root Cause Analysis Staff Netflix Warranty Frequently Asked Questions Specifications USB Social Skype Evernote Criminal Wire E-Commerce Software Tips Trending Remote Computing Practices Safe Mode Password Manager Storage Line of Business File Versioning Accountants HVAC SaaS Search Engine Managed Service Provider Wireless Cables Current Events Employee Meetings Data Management Digital Signature Electronic Health Records Cleaning Printer End of Support Excel Millennials Recovery Vendor Start Menu Wireless Charging Windows 10 Camera Physical Security Lifestyle Hosted Computing Business Mangement webinar MSP Multiple Versions Data Warehousing Office Tips WiFi Enterprise Content Management Audit Bing PDF Flash Unified Communications Devices Knowledge Digital Signage Technology Tips Travel Computer Care Mouse Tip of the week Workforce Display Mobile Smart Office Emails HaaS Inventory Patch Management Augmented Reality Gmail Addiction Conferencing Remote Worker Restore Data Risk Management IoT Password Management Help Desk Amazon Wireless Technology Theft Thought Leadership Network Congestion Google Search Screen Mirroring Strategy YouTube Samsung Administrator Windows Server 2008 Telecommuting IBM Webinar Colocation Music Safety History Politics Television Net Neutrality Relocation Audiobook Company Culture Search Customer Relationship Management IT solutions Wearable Technology Competition Transportation Worker Techology Video Games IP Address Public Computer ISP Humor Managing Stress Loyalty Utility Computing Books Automobile Customer Service Internet Exlporer How to Benefits Rootkit User Error Mobile Office Domains Employer Employee Relationship Best Practice Hybrid Cloud Regulation Troubleshooting Hiring/Firing Smart Technology Scalability Public Speaking Twitter Computer Accessories Emergency Presentation Two Factor Authentication Quick Tips Fun Internet exploMicrosoft Shadow IT Hosted Solution CrashOverride Vendor Management Printers Experience Lithium-ion battery Bluetooth Files Assessment 5G Office Content Tech Support Advertising

Mobile? Grab this Article!

QR-Code dieser Seite