Malware VPNFilter can infect more than 700,000 routers; know how to run away

Experts have issued a new alert about VPNFilter, a malware that infects Internet routers to steal user passwords. According to researchers at Talos, Cisco's intelligence arm, the threat reaches more devices than initially expected, increasing the estimate of 500, 000 to about 700, 000 casualties worldwide.

An in-depth investigation has also revealed that the attack is even more sophisticated than previously thought. In addition to obtaining personal information, the virus can intercept Internet traffic and even modify bank pages. The FBI investigates the problem and recommends that all users reset their routers. This Thursday (7), the Public Ministry also issued a statement for all Brazilians to restart the devices. Learn all about the threat and see how to protect yourself.

Router Security: Understand Risks and See Tips to Protect Yourself

Malware VPNFilter can infect more than 700, 000 routers; know how to run away

Increases the number of routers reached

Cisco initially showed that VPNFilter could only reach Linksys, Netgear, TP-Link and MikroTik routers. However, an update of the study points out that the number of affected models of these brands is even greater, and products from other manufacturers can also be hit. Experts added to the list routers manufactured by Asus, D-Link, Huawei, Ubiquiti and ZTE.

Routers Affected by VPNFilter

ASUSD-LINKHUAWEIMIKROTIKNETGEARUBIQUITITP-LINKZTE
RT-AC66UDES-1210-08PHG8245CCR1009DG834NSM2R600VPNZXHN H108N
RT-N10DIR-300LINKSYSCCR1016DGN1000PBE M5TL-WR741ND
RT-N10EDIR-300AE1200CCR1036DGN2200TL-WR841N
RT-N10UDSR-250NE2500CCR1072DGN3500
RT-N56UDSR-500NE3000CRS109FVS318N
RT-N66UDSR-1000E3200CRS112MBRN3000
DSR-1000NE4200CRS125R6400
RV082RB411R7000
WRVS4400NRB450R8000
RB750WNR1000
RB911WNR2000
RB921WNR2200
RB941WNR4000
RB951WNDR3700
RB952WNDR4000
RB960WNDR4300
RB962WNDR4300-TN
RB1100UTM50
RB1200
RB2011
RB3011
RB Groove
RB Omnitik
STX5
Source: Talos / Cisco slide to see the content

More sophistication

VPNFilter takes advantage of different security flaws in each attacked device to increase the casualties, a feature considered rare in such malware. The attack exploits known vulnerabilities in outdated routers and opens the way to downloading other malicious packets.

The malware then begins to intercept communication between devices connected to the Wi-Fi network and the web and forces the opening of HTTP pages, not HTTPS, the safest standard. When the virus manages to overturn the protection, personal information - such as passwords and logins - is exposed and can be transferred to criminals' servers.

Cisco has discovered that VPNFilter can also emulate fake pages automatically on the victim's computer. With the user's bank password in hand, for example, hackers can withdraw amounts from the account while the browser shows the balance intact to avoid suspicion. At the end of the attack, the malware is able to self-destruct to eliminate traces of the blow.

How to set your Wi-Fi router password

How to protect yourself

The VPNFilter has made victims mainly in Ukraine, but the actual extent of the attack is still unknown. In conversation with TechTudo, Luis Corrons, an Avast security evangelist, recommended care even if his router does not appear on the hit list. "VPNFilter can spread to multiple routers, no matter where they are in the world, including Brazil." Here's what you can do to stay safe:

Step 1. Routers usually have a small button on the back to reset the device. The measure allows you to remove the key features of VPNFilter, preventing malware from intercepting your internet traffic.

Hold the button down for several seconds until all lights blink. The device will return to the initial settings, so you will need to set it up again to re-establish the connection. The default network password is usually printed on a label on the back of the machine.

Press the reset button for several seconds to apply factory defaults

Step 2. Next, it is important to search for system updates for the router. Many of the vulnerabilities exploited by VPNFilter may have already been fixed by the vendors and have not been installed on the product. The update procedure varies from brand to brand. For example, in D-Link and TP-Link routers, you need to download the update package before installing it on the device.

Step 3. After the update, it is essential to change the access password to the router, since the default login is very simple to guess in most cases. Experts also recommend disabling the "Remote Administration" function if it was previously activated by the user - the feature is off at the factory.

Via Talos, FBI, BGR and Prosecutor's Office

How to change the router's channel to improve the Wi-Fi signal? Learn in the Forum