Contact us today!

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Understanding VPNFilter
VPNFilter is a malware that hides in your router and remains even if you restart the device. VPNFilter is known for prioritizing devices in Ukraine, but you should never count on the trend to protect you from known threats. It’s thought that the VPNFilter malware has its roots in a group called Sofacy, and the malware operates in three basic steps.

The first step for this malware is that it installs itself on the device and remains there even in the event that the router is rebooted or turned off. Second, the malware will install certain permissions on the router that allows it to change settings, manage files, and execute commands. The router can then proceed to brick itself, making it much more difficult for your organization to keep operations moving along. In its final stages, this malware lets a hacker see the data packets that are being sent to and from your organization’s device, meaning that they can then also issue commands and communicate with the device via a Tor web browser.

This threat was specifically mentioned by the FBI because of its persistence. While resetting the device will disable the second and third steps, the first will remain, creating an endless cycle if you don’t do anything about it.

Is Your Router Affected?
Even though not all routers are affected, the number is still quite considerable. Here is a list of affected brands:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you would like a more comprehensive list of all affected devices, Symantec has a list on their website:

How You Fix It
There is an easy fix to VPNFilter, and it’s to perform a factory reset on your router. This eliminates anything that’s currently installed from the first stage of VPNFilter’s attack. Of course, it’s also worth mentioning that the manufacturer of the router may have also administered a patch or security update resolving the vulnerability, so be sure to check for that as well so that it will never be an issue again.

For more great updates and tech tips, be sure to subscribe to FRS Pros’s blog.

Tip of the Week: Changing Your Network Profile
Why (and How) SMBs Should Strategically Adopt Tech...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Business Management Business Computing Software Cloud Network Security Google Tech Term Hackers Hardware Cybersecurity Malware Hosted Solutions Mobile Devices Windows User Tips Microsoft Computer Data Backup Cybercrime Data Security Android Innovation Browser Productivity Apps Operating System Smartphone Data Recovery Backup Phishing Office 365 Money Outsourced IT Business Continuity Email Alert Efficiency Law Enforcement Ransomware Internet of Things Vulnerability Best Practice Network Chrome IT Services IT Support Business Managed IT Services Smartphones Saving Money Disaster Recovery Mobile Device Management IT Support Server Gadgets Tech Support Employer-Employee Relationship Router Collaboration Google Drive Microsoft Office Data Small Business Windows 10 Managed Service Provider Managed IT Computers Information Technology Unsupported Software Virtualization Communications Windows 10 VoIP App Blockchain Two-factor Authentication Cloud Computing Spam Telephone Systems Sports User Error Quick Tips Applications Data Storage Networking WiFi Cortana Hosted Solution Password Application Automation OneNote Avoiding Downtime Audit Safety Data Protection Patch Management Wireless Charging Hacking Google Docs Holiday Devices Artificial Intelligence Gmail Government Save Money Risk Management Data Breach Cost Management Managed IT Services Robot Upgrade Wi-Fi WannaCry Travel Miscellaneous Commerce Wireless Technology Excel The Internet of Things Social Media Update Data Management Shortcut VPN iPhone Mobile Security Politics Fraud Productivity BDR Proactive IT Facebook Google Assistant Hybrid Cloud IT solutions FAQ Remote Computing Health Identity Access Edge Retail Websites Chromecast Samsung NFL eWaste Wireless Internet Touchscreen Wireless iOS WIndows Server 2008 Settings Value Telephony Identities Amazon Windows 10s HBO Charger Search Data Privacy Internet Exlporer Legal Data Loss Ciminal Mobility Screen Mirroring Conferencing Data Theft Transportation Antivirus Computer Care Nanotechnology Word Device Security Laptop Gamification Encryption Private Cloud Adobe Workers Uninterrupted Power Supply Unified Threat Management Legislation Language Virtual Assistant Solid State Drive Hard Drive Meetings Project Management Emails Cast Gifts Computing Going Green Social Root Cause Analysis Windows Ink Touchpad Memory Computer Fan Licensing Updates Computer Forensics Emergency Upgrades Comparison Alexa for Business Files Point of Sale Hard Disk Drive IT Management Outlook Chromebook DDoS Microsoft Excel IT budget Marketing BYOD Credit Cards App store Recovery Augmented Reality Google Maps Spyware Humor Passwords Financial Disaster Virus Budget Identity Theft Microsoft Word Management Specifications IT Solutions Printing File Sharing Webinar Administrator Apple Bring Your Own Device Sales Proactive Reputation Streaming Media Vendor Management Tablets Maintenance PowerPoint Lithium-ion battery Consultant Sync Evernote Data storage SaaS Remote Monitoring Storage Social Engineering History Education Hiring/Firing Video Games Experience Television CrashOverride Work/Life Balance Company Culture Text Messaging Virtual Reality Users Crowdsourcing Employer Employee Relationship Congratulations Current Events Electronic Medical Records Benefits Phone System Mobile Device Office tips Save Time Computer Accessories Advertising Twitter Battery Smart Technology Flexibility Music Communication Hacker Instant Messaging End of Support Scalability Analytics HaaS Keyboard Relocation Entertainment Black Market Cleaning Automobile Office es Big Data Cache Personal Information Managing Stress Workplace Tips Training Monitors PDF USB Worker Scam Thank You How To Books Mobile Computing