Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

Explaining VPNFilter
The malware in question, VPNFilter, hides in routers for both individual users and small businesses with the intention of persisting even if the device has been rebooted. VPNFilter targets devices that are Ukraine-based most of the time, but others have been known to fall victim to this as well. It’s thought that the VPNFilter malware originated from a group called Sofacy. The malware itself takes three steps to become an issue for your organization.

The first is that the malware sets itself up so that it will persist even if the device is rebooted or turned off. The second stage of the attack consists of the malware installing permissions for itself to change router settings, manage files, and execute commands. This allows the router to essentially brick itself, leading to considerable connectivity problems. The final stage of this malware lets the hackers look at the data packets passing to and from the device, as well as the ability to issue commands and communicate through the Tor web browser.

The reason why the FBI recommends resetting your router is because the second and third steps are wiped when you do so, but the first stage remains regardless.

Is Your Router Affected?
While not all routers are affected, there is still a sizeable list of confirmed contaminated devices. Some of the affected brands include:

  • Asus
  • D-Link
  • Huawei
  • Linksys
  • MikroTik
  • Netgear
  • TP-Link
  • Ubiquiti
  • Upvel
  • ZTE

For a comprehensive list of affected devices, you can see specifics for each brand at Symantec’s website: https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware

How to Fix It
The best way to resolve these issues with VPNFilter is to perform a factory reset for your router, which completely deletes anything installed during the first stage of the threat. If the router’s manufacturer has administered a patch for the vulnerability, you can also install it following a factory reset so that you’ll never have to deal with this vulnerability again.

For more updates and tips on some of the latest threats, keep an eye on Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Phishing Windows Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Gadgets Chrome Virtualization Social Media Saving Money Holiday Tech Term Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Hacking Wi-Fi BYOD Health Mobile Device Management Networking Internet of Things IT Support Spam Managed Service Provider Alert Covid-19 Office 365 Telephone Systems Information Technology Information Remote Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Remote Monitoring Data Breach Big Data Password Money App History Encryption Mobile Computing Applications Application Human Resources Law Enforcement Mobile Office Managed IT Apps Office Tips Blockchain Paperless Office Training How To VPN Government Data Storage Patch Management Remote Computing Private Cloud HaaS Servers Bring Your Own Device Data Management Work/Life Balance Data Security Flexibility Wireless Marketing WiFi Gmail IT solutions Google Drive Entertainment Website Settings Budget Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Vulnerability Windows 7 Mouse Word Data Protection User Error Save Time Vendor Managed Services Meetings Vendor Management Display Cleaning Risk Management Employee/Employer Relationship Hacker RMM End of Support Telephone System Staff The Internet of Things Software as a Service Physical Security Lithium-ion battery Education Machine Learning Safety Remote Work Connectivity HIPAA Sports Redundancy USB Firewall Keyboard Conferencing Virtual Reality Apple Scam Social IT Management Cryptocurrency Solid State Drive Wireless Technology How to Managed Services Provider Downtime Botnet IT Plan Database Data storage Comparison Wearable Technology Automobile Remote Workers Unsupported Software Retail CES Hard Drives Instant Messaging Processor Robot Computing Infrastructure Charger Excel Virus Business Technology Content Management Going Green Biometrics Compliance Access Control Hard Drive OneNote Virtual Desktop Computer Care Unified Threat Management Computer Accessories Virtual Assistant Current Events Telephony Battery Authentication DDoS Computing Samsung Shadow IT Legal SharePoint Value Internet Exlporer Printer Update Electronic Medical Records Bluetooth Spam Blocking Customer Service PDF Digital Signage Environment Google Docs Hiring/Firing Identity Theft Fax Server Proactive IT Procurement IT Consultant Best Practice Workplace Strategy SaaS Net Neutrality YouTube Augmented Reality Black Market Fraud Help Desk Humor Business Intelligence Printing Remote Worker Network Congestion Worker eWaste Document Management Audit Point of Sale Personal Public Computer Recycling Cryptomining Tablets Consultant Analytics Regulations Wiring Supply Chain Management Practices Entrepreneur Transportation Computer Fan Cache Batteries Files Rootkit Amazon Web Services Monitoring Windows 8.1 Safe Mode Digitize Shortcut Criminal Chromecast Best Available Cost Management Benefits WIndows 7 GDPR Workers Hosted Computing Windows Server 2008 R2 FENG Wireless Internet Social Networking Colocation Online Shopping Uninterrupted Power Supply Customer relationships Email Best Practices File Sharing IT Assessment IBM Manufacturing Monitor Smart Technology Specifications Flash Camera Inventory Running Cable Wire Managed IT Service Evernote Security Cameras Computer Tips Virtual CIO Software Tips OneDrive Supercomputer Biometric Security Memory Travel Reputation Millennials User Streaming Media PowerPoint Sync Printers Windows Media Player Peripheral Emails Content Smart Office Using Data Wireless Charging Tech Support Digital Security Cameras Copiers Techology 5G Laptop Customers Two Factor Authentication Workforce Managing Stress Virtual Private Network Quick Tip Netflix Audiobook Root Cause Analysis Cables Smartwatch Science Ergonomics Cameras HBO Development Knowledge OLED Touchpad Music Telecommuting Skype Project Management PCI DSS Nanotechnology Virtual Machine Distributed Denial of Service Politics Data loss Fiber Optics Customer Relationship Management Advertising Cortana Employee 2FA Outlook Messaging Leadership Digital Signature Cabling Analyitcs Troubleshooting Programming Notifications Start Menu Warranty Policy Hypervisor Screen Mirroring HVAC Trend Micro Loyalty Google Apps Dark mode Printer Server Frequently Asked Questions SMS Analysis Default App Books Relocation Mobile Administrator Procedure Antivirus Windows 10s Devices Saving Time dark theme Cast Enterprise Content Management Shopping Google Search Windows 8 Tip of the week MSP AI IT service Video Games webinar Accountants IT Infrastructure Emergency Employer Employee Relationship Credit Cards Bing Professional Services Microchip FinTech Worker Commute Public Cloud Thought Leadership Experience Password Management Social Network Assessment Password Manager Tablet Windows Server 2008 Domains Scalability Investment Multi-Factor Security Employee/Employer Relationships Tools Search Engine Employees Business Owner Twitter Windows 365 IaaS NIST Maintenance Television Business Mangement ISP NarrowBand Video Conferencing Search Smart Tech ROI Bloatware Trending Bitcoin iPhone Amazon Shortcuts Sales Addiction

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code