Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Understanding VPNFilter
VPNFilter is a malware that hides in your router and remains even if you restart the device. VPNFilter is known for prioritizing devices in Ukraine, but you should never count on the trend to protect you from known threats. It’s thought that the VPNFilter malware has its roots in a group called Sofacy, and the malware operates in three basic steps.

The first step for this malware is that it installs itself on the device and remains there even in the event that the router is rebooted or turned off. Second, the malware will install certain permissions on the router that allows it to change settings, manage files, and execute commands. The router can then proceed to brick itself, making it much more difficult for your organization to keep operations moving along. In its final stages, this malware lets a hacker see the data packets that are being sent to and from your organization’s device, meaning that they can then also issue commands and communicate with the device via a Tor web browser.

This threat was specifically mentioned by the FBI because of its persistence. While resetting the device will disable the second and third steps, the first will remain, creating an endless cycle if you don’t do anything about it.

Is Your Router Affected?
Even though not all routers are affected, the number is still quite considerable. Here is a list of affected brands:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

If you would like a more comprehensive list of all affected devices, Symantec has a list on their website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How You Fix It
There is an easy fix to VPNFilter, and it’s to perform a factory reset on your router. This eliminates anything that’s currently installed from the first stage of VPNFilter’s attack. Of course, it’s also worth mentioning that the manufacturer of the router may have also administered a patch or security update resolving the vulnerability, so be sure to check for that as well so that it will never be an issue again.

For more great updates and tech tips, be sure to subscribe to FRS Pros’s blog.

Tip of the Week: Changing Your Network Profile
Why (and How) SMBs Should Strategically Adopt Tech...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Tech Term Google Business Management Cloud Business Computing Software User Tips Hackers Hardware Microsoft Computer Malware Browser Productivity Efficiency Mobile Devices Windows Cybersecurity Hosted Solutions Data Backup Smartphone Innovation Cybercrime Apps Internet of Things Android Backup Windows 10 Office 365 Data Recovery IT Services Data Security Email Smartphones Operating System Outsourced IT Mobile Device Management Data Business Continuity Vulnerability Money Business Upgrade Alert Phishing VoIP Law Enforcement IT Support Disaster Recovery Ransomware Best Practice Employer-Employee Relationship Communications Applications Chrome Microsoft Office Saving Money Collaboration Managed IT Services Network Server IT Support Gadgets Managed IT Tech Support Information Unsupported Software Router App Google Drive Blockchain Two-factor Authentication Cloud Computing Spam Small Business Windows 10 Computers Virtualization Information Technology Passwords Miscellaneous Managed Service Provider Telephone Systems Managed Service Sports BDR Data Breach Cost Management Managed IT Services Facebook Augmented Reality Mobile Security Users Bring Your Own Device WannaCry Quick Tips Password Travel Commerce Automation Excel Google Assistant Application Hosted Solution Encryption Fraud Avoiding Downtime Safety Hacking Proactive IT Gmail Evernote SaaS Holiday Save Money User Error Communication Touchscreen Data Storage Artificial Intelligence Risk Management Government Networking WiFi Cortana Mobile Device OneNote Budget Robot Wireless Technology Word Wi-Fi Audit Data Management Update Patch Management Politics Wireless Charging The Internet of Things Social Media Google Docs Shortcut Project Management Data Protection VPN iPhone Productivity Devices Workplace Tips Computer Fan Reputation Licensing Updates Upgrades Management Access Control Access Comparison Scam Outlook Data storage Printing Telephone Chromecast Microsoft Excel IT budget Hard Disk Drive History IT Management Samsung App store Remote Computing Health Projects Google Maps Spyware Marketing BYOD Telephony Credit Cards Vendor Microsoft Word PowerPoint Admin Internet Exlporer Specifications Virus Legal Settings Hyperlink File Sharing IT Solutions Wireless Antivirus Search Identity Apple Webinar Mobility Hybrid Cloud Uninterrupted Power Supply Transportation Employee-Employer Relationship Tablets Maintenance Consultant Laptop Wireless Internet Sales Proactive Private Cloud Sync Remote Monitoring Value Wasting Time Storage Social Engineering FAQ Data Privacy Windows 7 Edge IT solutions Amazon Going Green Social Business Technology Files NFL Emergency eWaste Touchpad Gamification DDoS Retail Websites iOS WIndows Server 2008 Software as a Service Disaster Accessory Recovery Point of Sale Identities Charger Hard Drive Display Data Loss Ciminal Windows 10s HBO Virtual Assistant Computer Care Nanotechnology Testing Device Security Humor Screen Mirroring Memory Conferencing Identity Theft Data Theft Bandwidth Adobe Workers Unified Threat Management Computer Forensics Peripheral Administrator Legislation Language Alexa for Business Lithium-ion battery Meetings Chromebook Co-Managed Services Streaming Media Solid State Drive Root Cause Analysis Camera Windows Ink Emails Cast Financial Gifts Vendor Management Computing How To Books PDF Video Games Experience Education Hiring/Firing Mobile Computing Virtual Reality Congratulations Work/Life Balance Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship Compliance Phone System es Cache Benefits Printers Save Time Training Monitors Office tips Computer Accessories Regulation Flexibility Music Advertising Battery Smart Technology Television CrashOverride Instant Messaging Hacker Company Culture Scalability Analytics Twitter Entertainment End of Support Keyboard HaaS Relocation Black Market Cleaning Big Data Automobile Office Managing Stress Personal Information USB Worker Thank You