Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Tech Term Chrome Social Media Virtualization Saving Money Gadgets Holiday Microsoft Office Automation Managed IT Services Managed Service Facebook Computers Cybercrime Artificial Intelligence Operating System Hacking Health Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Information Technology Remote Alert Spam Covid-19 Information Office 365 Managed Service Provider Telephone Systems Mobility Router Recovery Employer-Employee Relationship BDR Bandwidth Social Engineering App Encryption History Applications Data Breach Mobile Computing Law Enforcement Human Resources Application Remote Monitoring Password Money Big Data Office Tips Data Storage Patch Management Training VPN Government Private Cloud Remote Computing Blockchain Paperless Office Managed IT Mobile Office How To Apps Wireless Vulnerability Google Drive Windows 7 Word Gmail Flexibility Marketing Settings Avoiding Downtime Servers WiFi IT solutions Entertainment Website Two-factor Authentication Budget Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Physical Security Education Conferencing Safety The Internet of Things Scam HIPAA Sports Lithium-ion battery Redundancy Data Protection Keyboard Vendor Management Firewall Virtual Reality USB Apple Save Time Vendor Social Managed Services Software as a Service Display Telephone System Staff User Error Machine Learning Meetings Cleaning Connectivity Remote Work Employee/Employer Relationship RMM Risk Management End of Support Hacker Internet Exlporer Augmented Reality Fraud DDoS Business Intelligence Virus Digital Signage SharePoint PDF Remote Worker Audit Worker Unified Threat Management IT Management Cryptocurrency Computer Accessories Proactive IT Customer Service Botnet Environment Best Practice IT Plan Procurement Comparison Net Neutrality YouTube Workplace Strategy Fax Server Black Market Unsupported Software CES Help Desk Printer Printing Bluetooth Charger SaaS Business Technology Content Management Document Management Compliance Solid State Drive Wireless Technology Access Control OneNote Computer Care Managed Services Provider How to Downtime Network Congestion Virtual Assistant Current Events Authentication IT Consultant Database eWaste Telephony Data storage Samsung Automobile Remote Workers Humor Value Processor Update Computing Infrastructure Spam Blocking Electronic Medical Records Wearable Technology Going Green Retail Hard Drives Hard Drive Google Docs Instant Messaging Excel Hiring/Firing Identity Theft Robot Battery Biometrics Shadow IT Computing Legal Virtual Desktop Password Management PCI DSS Assessment Password Manager Virtual Machine Multi-Factor Security Employee Politics Advertising Windows Server 2008 2FA Fiber Optics Science Twitter Messaging Cabling Tools Search Engine Notifications NIST Policy Television Business Mangement Hypervisor Trending PowerPoint Windows Media Player Dark mode Smart Tech Trend Micro User Addiction SMS Amazon Default App Distributed Denial of Service Customer Relationship Management Relocation Analyitcs Procedure Public Computer Recycling Saving Time Transportation Google Search Programming Regulations Wiring dark theme Practices Shopping Managing Stress Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Video Games Safe Mode FinTech Criminal Bing Worker Commute Cameras Benefits Experience Antivirus GDPR Workers Hosted Computing Social Network Windows 8 FENG Wireless Internet Online Shopping Investment Scalability IT service File Sharing Employees IBM Employee/Employer Relationships Business Owner Smart Technology Specifications ISP NarrowBand Flash Camera Windows 365 Inventory Tablet Wire Video Conferencing Evernote ROI Search Domains iPhone Software Tips Sales Supercomputer Bitcoin Travel Shortcuts Printer Server Millennials Cryptomining Sync Printers Point of Sale Emails Personal Smart Office Supply Chain Management Wireless Charging IaaS Maintenance Files Bloatware Monitoring Batteries Netflix Digitize Two Factor Authentication Workforce Chromecast Virtual Private Network Windows 8.1 Tablets Root Cause Analysis Cables Windows Server 2008 R2 Music Colocation Entrepreneur Uninterrupted Power Supply HBO Customer relationships Knowledge Nanotechnology IT Assessment Telecommuting Manufacturing Skype Project Management Email Best Practices Monitor Data loss Cortana Shortcut Troubleshooting Security Cameras Cost Management Outlook Computer Tips Leadership Digital Signature Managed IT Service OneDrive Biometric Security Social Networking Start Menu Warranty Virtual CIO Reputation Streaming Media Screen Mirroring HVAC Peripheral Loyalty Google Apps Consultant Books Content Analytics Tech Support Frequently Asked Questions Digital Security Cameras Analysis Using Data Windows 10s Devices Copiers 5G Running Cable Techology Laptop Mobile Administrator Customers Memory Cast Enterprise Content Management Quick Tip Best Available Emergency Smartwatch Audiobook Tip of the week MSP Ergonomics webinar Accountants WIndows 7 Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Touchpad Professional Services Microchip

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code