Contact us today!

Professional Computer Associates Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website:

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Professional Computer Associates’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Malware Backup Hosted Solutions Managed IT Services VoIP Google Email Innovation Disaster Recovery Microsoft Mobile Devices Software Data Internet Productivity Business Outsourced IT Data Backup Business Continuity IT Services communications Smartphones Efficiency Cybercrime Hardware Ransomware Windows 10 IT Support Data Recovery Computer Tech Term Browser Internet of Things Cloud Computing Android BDR Office Saving Money Windows Alert Telephone Systems Business Management Computers Server Workplace Tips User Tips Network Upgrade Artificial Intelligence Small Business Save Money Virtualization Smartphone Applications Miscellaneous Cybersecurity Mobile Device Management Microsoft Office Law Enforcement Firewall Communication Collaboration BYOD Social Media Managed IT Quick Tips Chrome Facebook Social Engineering Passwords Hacking Mobility App Recovery Managed Service Provider Router Automation Work/Life Balance Holiday Avoiding Downtime Private Cloud Password Office 365 Bandwidth Gadgets How To Productivity Money Office Tips Two-factor Authentication Operating System Information Technology Gmail Bring Your Own Device Budget Managed IT Services VPN Training Proactive IT Data Protection Health Phishing Redundancy Business Intelligence Data Management Data Security HaaS Flexibility Windows 10 Wi-Fi Remote Monitoring IT Management Sports Word Apps Cleaning IT Support Black Market Vulnerability Compliance Google Drive Risk Management Mobile Device Safety Settings SaaS Value Employer-Employee Relationship Marketing User Error Data Breach Analysis Document Management Spam Blockchain Entertainment Identity Theft Big Data Encryption Mobile Computing Connectivity Paperless Office End of Support Apple Automobile Worker USB Computing Infrastructure Hiring/Firing Computer Care OneNote Instant Messaging Update HIPAA Physical Security Legal IT Plan eWaste Remote Computing Samsung Wireless Technology CES Battery Access Control Information Infrastructure Patch Management Unsupported Software Smart Tech Best Practice Data Storage Business Owner File Sharing Servers Keyboard Website Content Management Education Shadow IT Workers Downtime Managed Service Streaming Media Scam Public Cloud DDoS Content Filtering History Comparison Internet Exlporer Machine Learning Charger YouTube Networking Save Time Virtual Assistant Spam Blocking Data loss Electronic Medical Records Windows 7 Data storage Meetings Solid State Drive Government Wireless PDF Wearable Technology Credit Cards Unified Threat Management The Internet of Things Windows 10s Telephony Fax Server Cortana Addiction Books IBM Touchpad Millennials Notifications Telephone System Wireless Charging Devices Assessment GDPR Screen Mirroring Trending Staff Virtual Reality Cryptocurrency Regulations Outlook NarrowBand Line of Business Criminal Smart Technology Frequently Asked Questions Mobile Office Fraud Inventory Skype IT solutions Google Apps Mouse Emergency Students IT Consultant Internet exploMicrosoft Workforce IoT Rootkit Fiber-Optic Thought Leadership Troubleshooting Television Cache E-Commerce Supercomputer Cast hacker Lifestyle Digital Signature Worker Commute Employer Employee Relationship Safe Mode Humor MSP Botnet iPhone Search Google Docs Tech Support HVAC Excel Amazon Audit Start Menu Healthcare Leadership Advertising Environment Telecommuting Content Running Cable Cables Content Filter Hosted Solution Public Computer Wireless Internet Current Events Strategy Lithium-ion battery Computer Accessories Netflix Monitor Authentication Chromecast Augmented Reality Root Cause Analysis Travel How to Two Factor Authentication Enterprise Content Management Tip of the week Antivirus Amazon Web Services Computer Fan Mobile Password Manager Electronic Health Records Software Tips Remote Work Insurance Audiobook IaaS Vendor Management Reputation Techology Unified Communications Storage Wire Knowledge Going Green Bluetooth Business Technology Flash Online Shopping Nanotechnology Experience Loyalty Remote Worker Files SharePoint Voice over Internet Protocol Password Management Windows Server 2008 Robot Hard Drives Proactive FENG Professional Services Relocation WiFi Video Games Business Mangement Transportation Uninterrupted Power Supply webinar Hybrid Cloud Practices Politics Sync Customer Theft Distributed Denial of Service Smart Office Network Congestion Data Warehousing Laptop Specifications Accountants Evernote Music Wiring Colocation Multi-Factor Security Human Resources Users NIST Emails Remote Monitoring and Maintenance Tools Scalability Software as a Service Recycling Benefits Conferencing HBO People Hosted Computing Webinar Congratulations Managing Stress Regulation IT solutions CrashOverride Printers Administration Twitter Thank You Company Culture

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!