Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Professional Computer Associates’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Microsoft Disaster Recovery Mobile Devices Software Productivity Business Internet Business Continuity Email Data Outsourced IT Innovation Data Backup communications Cybercrime Efficiency Ransomware Computer IT Support Smartphones Windows 10 Cloud Computing Hardware Data Recovery IT Services Browser Android Internet of Things BDR Office Saving Money Computers Server Business Management Telephone Systems Tech Term Alert Windows Cybersecurity Small Business Smartphone Upgrade Virtualization User Tips Mobile Device Management Network Collaboration Quick Tips BYOD Chrome Workplace Tips Social Engineering Save Money Law Enforcement Microsoft Office Managed IT Holiday Private Cloud Office 365 Mobility Social Media Work/Life Balance Router Hacking Miscellaneous Communication Avoiding Downtime Passwords App Office Tips Managed Service Provider Firewall Productivity How To Bandwidth Money Facebook Artificial Intelligence Password Recovery Flexibility Wi-Fi Two-factor Authentication Data Management Data Protection Bring Your Own Device Phishing Applications VPN Data Security Remote Monitoring Proactive IT HaaS Budget Automation Operating System Business Intelligence Information Technology Gmail Health Redundancy Blockchain Windows 10 User Error Marketing Apps Gadgets Entertainment Word Black Market Compliance Mobile Device Google Drive Data Breach Cleaning Spam Big Data Risk Management SaaS Connectivity Employer-Employee Relationship Vulnerability Managed IT Services Value Safety Document Management Identity Theft Save Time Remote Computing Wireless Technology Settings Credit Cards Windows 7 Worker Automobile Streaming Media IT Management USB PDF OneNote Encryption IT Plan Legal Computing Infrastructure Battery Training Physical Security Mobile Computing Access Control Wearable Technology Unsupported Software Education Servers Infrastructure Comparison Content Filtering Downtime Charger Analysis Networking History Electronic Medical Records Spam Blocking Data loss Solid State Drive Best Practice Data storage Paperless Office DDoS Shadow IT Hiring/Firing Update Computer Care HIPAA Government End of Support IT Support Internet Exlporer YouTube Samsung Patch Management Meetings Wireless Business Owner CES Website The Internet of Things Smart Tech Apple Data Storage Keyboard Scam Workers Sports Content Management eWaste Public Cloud FENG Reputation Machine Learning Professional Services Lithium-ion battery Multi-Factor Security Practices Environment Data Warehousing Music Network Congestion Files Virtual Assistant Hybrid Cloud Running Cable Theft Benefits Emails Customer Tools Human Resources Trending Chromecast Hosted Computing Assessment Colocation Telephone System Fraud Addiction Regulations Cortana Smart Technology Rootkit SharePoint Staff Lifestyle Inventory Television Troubleshooting IT Consultant Amazon Cache Uninterrupted Power Supply Google Apps Content HVAC Botnet Digital Signature Notifications Public Computer Hosted Solution People Leadership hacker Amazon Web Services Wireless Internet Two Factor Authentication Fax Server Netflix Vendor Management Root Cause Analysis Audiobook Enterprise Content Management Travel Strategy Authentication Software Tips Mobile Office Online Shopping Wire Flash Password Manager IT solutions Politics Hard Drives Password Management Specifications Going Green Nanotechnology webinar Video Games Users Evernote Robot Smart Office Sync Tech Support Business Mangement Accountants Unified Threat Management Relocation NIST Software as a Service Millennials Laptop IBM Antivirus HBO Books Conferencing Scalability Virtual Reality Telephony Recycling Windows 10s Screen Mirroring IaaS Cryptocurrency Workforce Touchpad Devices Supercomputer Frequently Asked Questions Wireless Charging Emergency Instant Messaging Employer Employee Relationship WiFi Worker Commute Outlook Students Distributed Denial of Service Skype Criminal Google Docs IoT Cast Safe Mode Search Internet exploMicrosoft Telecommuting Thought Leadership Current Events Excel Fiber-Optic Computer Accessories Audit Humor Healthcare Start Menu iPhone File Sharing How to Advertising Remote Work Content Filter Tip of the week Cables Bluetooth Computer Fan Monitor Electronic Health Records Mouse Mobile Voice over Internet Protocol NarrowBand Insurance Loyalty Experience Knowledge Techology Business Technology Storage Windows Server 2008 Unified Communications Transportation Twitter Company Culture Webinar Managing Stress IT solutions CrashOverride Administration Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!