Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Alternative IT Solutions Blog

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Alternative IT Solutions’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Network Security Email Tech Term Data Backup Google Hackers Malware Innovation Mobile Devices Managed IT Services Microsoft Outsourced IT VoIp Managed IT Services Cloud Computing Internet Software Data Data Recovery IT Support Hosted Solutions Small Business Saving Money Android Hardware Internet of Things User Tips Communication Backup Efficiency Smartphones BDR Artificial Intelligence How To Cybersecurity IT Services Alert Communications Network Cybercrime Ransomware Mobile Device Management Data Security Computers Collaboration Browser Router Windows Chrome Money Windows 10 Productivity Business Management Business Continuity Applications Phishing Two-factor Authentication Gadgets Data Protection Smartphone Connectivity Spam Business Office 365 Remote Monitoring Server Vulnerability Social Media Identity Theft Disaster Recovery Social Engineering Facebook Managed IT IT Management Word BYOD Business Intelligence Save Money Workplace Tips Telephone Systems Website Settings Workers Computer Comparison Training Upgrade Law Enforcement IT Plan Information Encryption Unsupported Software Virtualization Wi-Fi Windows 7 Employer-Employee Relationship Managed Service Avoiding Downtime App Infrastructure Data Storage Virtual Assistant Sports Update Mobile Computing Networking CES Passwords Microsoft Office Apps Budget Operating System OneNote Password Spam Blocking Bring Your Own Device Value Holiday Content Management Data Breach Work/Life Balance Credit Cards VPN Miscellaneous Mobile Device Paperless Office Compliance Servers Firewall Blockchain Redundancy Document Management Private Cloud Cortana Big Data Google Drive Botnet Risk Management Knowledge PDF Hosted Computing Screen Mirroring File Sharing Skype Unified Threat Management HIPAA USB Data Warehousing Wireless Charging Conferencing Windows Server 2008 Enterprise Content Management Sync Content Filtering Legal Public Cloud Amazon Office Tips Leadership YouTube Scam Google Apps Business Mangement Devices Travel Telecommuting Network Congestion FENG HBO Inventory Cast Specifications Marketing Data Management Wire Computer Fan Government Password Management Information Technology Lifestyle Criminal Addiction MSP Amazon Web Services Voice over Internet Protocol Gmail Thought Leadership Remote Work HaaS Outlook Charger Netflix Access Control Start Menu Millennials Human Resources The Internet of Things Software Tips Meetings Patch Management Samsung NIST Regulations Proactive IT Recovery Augmented Reality Online Shopping Smart Tech Recycling Electronic Medical Records IT Consultant Frequently Asked Questions Bandwidth Authentication Telephone System Tools Workforce SaaS Staff Smart Office Black Market Hiring/Firing HVAC Flash Cryptocurrency Flexibility IBM Cache Solid State Drive Remote Worker Mobility Evernote Cleaning Multi-Factor Security eWaste Windows 10s Telephony Mobile Entertainment Downtime Excel Theft Password Manager Nanotechnology Current Events Digital Signature Physical Security Google Docs Practices Data loss Safe Mode Supercomputer Wireless Internet Audit IT Support Wiring Software as a Service Keyboard Automation webinar Computer Care Trending Professional Services Fraud Accountants Machine Learning Root Cause Analysis Tip of the week Office Regulation Quick Tips Education Health Save Time GDPR Safety Twitter Help Desk Managed Service Provider Line of Business Windows 10 Students Hacking Battery Business Technology E-Commerce Fiber-Optic Automobile Consultation IoT Company Culture Strategy Healthcare Thank You Camera Cables Managing Stress Streaming Media Instant Messaging Assessment Analysis Electronic Health Records Computer Accessories Congratulations Printers WiFi Unified Communications Insurance Business Owner Bata Backup Rootkit Bluetooth Content Filter Proactive Television Two Factor Authentication Employer Employee Relationship Vendor Management Loyalty Storage VoIP Worker Remote Monitoring and Maintenance Public Computer

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD