Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website:

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on One World Technology Inc.’s blog.

Know Your Tech: CMS
How to Be Selective when Picking a Backup Solution


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign up for our Newsletter!

Powered by ChronoForms -

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Best Practices Technology Cloud Network Security Business Computing Managed IT Services Backup Malware Hackers Hosted Solutions Outsourced IT Software Google VoIP Microsoft Email Business Continuity Data Backup Business Data Mobile Devices Disaster Recovery IT Support Windows 10 Data Recovery Saving Money Cloud Computing Cybercrime Ransomware Innovation Smartphones Android Efficiency Productivity IT Services Hardware Small Business Alert Communications Internet Computer Tech Term Browser Internet of Things BDR Office Business Management Computers Law Enforcement User Tips Managed IT Smartphone Virtualization Server Cybersecurity How To Telephone Systems Router Productivity Save Money Artificial Intelligence Mobility Collaboration Chrome Windows Communication Passwords Work/Life Balance Password Firewall Office 365 Budget Data Protection Network Quick Tips Social Engineering Managed IT Services Facebook Wi-Fi Flexibility Holiday Private Cloud Hacking Data Security Mobile Device Management Office Tips Social Media Health App Avoiding Downtime Money Remote Monitoring Business Intelligence Phishing Value Redundancy Information Technology Compliance BYOD Mobile Device Recovery Big Data Document Management Spam Bring Your Own Device HaaS Managed Service Provider Gadgets Vulnerability Proactive IT Upgrade Apps Automation Two-factor Authentication Workplace Tips Connectivity Data Breach Identity Theft Miscellaneous Word Bandwidth Applications Government HIPAA Google Drive Windows 10 Networking Worker Infrastructure OneNote Content Filtering Solid State Drive History IT Management End of Support SaaS Spam Blocking Comparison Business Owner Two Factor Authentication IT Plan IT Support Training Update Operating System Keyboard Unsupported Software Save Time Electronic Medical Records Workers Entertainment Charger Analysis Remote Computing Website Data loss Patch Management Windows 7 Hiring/Firing VPN Public Cloud USB Scam Automobile Cleaning Risk Management Battery CES Data Management Computer Care Education Content Management Credit Cards Data Storage Paperless Office Servers Employer-Employee Relationship Computing Infrastructure Black Market PDF Marketing Blockchain Smart Tech Microsoft Office Legal Search Google Apps Cryptocurrency Travel Settings Mobile Computing Content Filter Hard Drives Virtual Reality Files Techology Human Resources Insurance Amazon Data Warehousing Healthcare webinar Internet Exlporer Best Practice Loyalty How to Safe Mode Storage Outlook IBM Worker Commute Staff Downtime Practices Amazon Web Services Electronic Health Records Sync Conferencing Rootkit Password Manager Software as a Service Frequently Asked Questions Supercomputer User Error Digital Signature Hosted Computing Online Shopping Machine Learning Telephony Content Internet exploMicrosoft Wireless Technology Shadow IT Apple Business Mangement Specifications Root Cause Analysis Books Addiction Excel Encryption Inventory Evernote YouTube Skype Audiobook Vendor Management Experience Wireless Assessment iPhone Gmail Virtual Assistant Windows 10s Millennials Cache Tip of the week Current Events Strategy Video Games Access Control Wireless Charging Software Tips Start Menu Advertising Music Television Recycling Google Docs Workforce Meetings Emergency Wireless Internet Windows Server 2008 Knowledge Relocation Authentication Fiber-Optic Physical Security Mobile Wearable Technology Public Computer Users eWaste Audit Telecommuting Wire Network Congestion Scalability Nanotechnology Cables HVAC Professional Services Emails Unified Threat Management Criminal Voice over Internet Protocol Remote Work Screen Mirroring Sports Regulations Employer Employee Relationship Accountants Humor Unified Communications HBO Enterprise Content Management Tools Hybrid Cloud Computer Fan Troubleshooting Devices Multi-Factor Security Cast Transportation Smart Office Leadership Colocation Computer Accessories Instant Messaging Theft Password Management Politics The Internet of Things Thought Leadership Safety Trending Benefits Bluetooth IoT Samsung Cortana NIST Botnet Netflix FENG Hosted Solution Streaming Media Lifestyle Fraud Smart Technology Students Flash hacker File Sharing CrashOverride Twitter Robot Business Technology WiFi Company Culture Telephone System Managing Stress Webinar IT solutions