Macworld (USA)

That Russia router malware threat might be worse than feared

In some cases, a full factory reset may be required.

- BY BRAD CHACOS AND MICHAEL SIMON

Your gateway to the Internet may be the portal that foreign hackers are using to snatch your data. The FBI recently issued a security notice ( go.macworld.com/ cyba) warning that all home and small office routers should be rebooted after Cisco’s Talos group ( go.macworld.com/cstl) discovered sophistica­ted Russian-linked “Vpnfilter” malware infecting at least 500,000 networking devices.

Here’s what you need to know about

Vpnfilter and the FBI’S guidance to reboot your router—which might not even safeguard against the malware completely.

WHAT’S THE THREAT?

Since all your Internet and local network traffic flows through your router, it can be pretty severe.

“Vpnfilter is able to render small office and home office routers inoperable,” the FBI warns. “The malware can potentiall­y also collect informatio­n passing through the router.”

Routers are especially ripe targets for hackers because they usually connect directly to the Internet and aren’t often protected by your PC’S antivirus or other security solutions. Most people don’t install router firmware updates, either, which can leave vulnerabil­ities exposed. Vpnfilter also encrypts its network traffic, which can make detection even more difficult, the FBI says.

Most recent infections observed by Cisco occurred in Ukraine, however, and the Justice Department ( go.macworld.com/ jsdp) connected Vpnfilter to “Sofacy Group,” an espionage group associated with Russia.

THAT DOESN’T SOUND SO BAD.

It gets worse. In a follow-up post, Cisco’s Talos ( go.macworld.com/xedp) has discovered “a new stage 3 module that injects malicious content into web traffic as it passes through a network device.” Better known as a “man-in-the-middle” attack, this means that bad actors can use this vulnerabil­ity to intercept network traffic and inject malicious code without the user’s knowledge. That means a hacker can manipulate what you see on your screen while still performing malicious tasks on your screen. As Craig Williams, a senior technology leader and global outreach manager at Talos, explained to Ars Technica, “They can modify your bank account balance so that it looks normal while at the same time they’re siphoning off money and potentiall­y PGP keys and things like that. They can manipulate everything going in and out of the device.” That’s a much greater threat than initially feared.

WHAT ROUTERS ARE AFFECTED?

The FBI’S security notice suggests that all router owners reboot their devices. Additional­ly, Cisco’s Talos group says that “Due to the potential for destructiv­e action by the threat actor, we recommend out of an abundance of caution that these actions be taken for all SOHO or NAS devices, whether or not they are known to be affected by this threat.”

So you should reboot your router no matter what. That said, Symantec ( go.

macworld.com/nwrm) released the following list of routers and NAS devices known to be susceptibl­e to Vpnfilter. Some are popular affordable models, and one (the Netgear WNR1000) is provided to Comcast customers in some circumstan­ces.

> Linksys E1200

> Linksys E2500

> Linksys WRVS4400N

> Mikrotik Routeros for Cloud Core

Routers: Versions 1016, 1036, and 1072

> Netgear DGN2200

> Netgear R6400

> Netgear R7000

> Netgear R8000

> Netgear WNR1000

> Netgear WNR2000

> QNAP TS251

> QNAP TS439 Pro

> Other QNAP NAS devices running

QTS software

> Tp-link R600VPN

Just this week, however, Cisco issued a warning that the threat goes beyond even those models, and includes a wider swath of routers manufactur­ed by ASUS, D-link, Huawei, Ubiquiti, UPVEL, and ZTE. So once again: The FBI and Cisco’s crack security squad suggest that we all reboot our routers, even if it’s not on this list.

HOW DO I REBOOT MY ROUTER?

Rebooting your router eradicates what Cisco calls the “Stage 2” and “Stage 3” elements of Vpnfilter—the destructiv­e part of the malware.

Rebooting your router is easy. Simply unplug it from the wall, wait 30 seconds, and plug it back in. Done!

IS THERE ANYTHING ELSE I SHOULD DO TO STAY SAFE?

Yes. Let’s start with the easy steps.

The FBI and some hardware makers recommend disabling remote management features on your router, which are off by default in most cases. You’ll also want to change your router’s default login credential­s, swapping in a strong, unique password—not one you use for any other websites or services. Pcworld’s guide to the best password managers ( go.macworld.com/pssm) can help if you aren’t using one already.

Even though routers aren’t typically protected by your PC’S antivirus, Symantec says its software can detect Vpnfilter. Running security software on your computer helps it stay as safe as possible, and this episode serves as a reminder that you should be doing it. Pcworld’s guide to the best antivirus for Windows PCS ( go. macworld.com/avpc) can help you pick the best for your situation.

Now for the bad news.

SHOULD I FACTORY RESET MY ROUTER?

What makes Vpnfilter so sophistica­ted is its “Stage 1” element, which can persist even through a reboot and then contact the hackers to reinstall the other stages of the malware. The Justice Department seized a domain that the malware used to install Vpnfilter’s later stages on infected PCS, but that doesn’t mean the threat is eliminated as it also uses other methods to connect with the hackers.

The only way to fully remove the malware is by performing a factory reset of your router and updating it to the latest firmware revision available, which will protect against known vulnerabil­ities. It’s a complicate­d procedure that will require you to reconfigur­e your network settings, but we’d recommend doing it if your router is on the list of devices known to be vulnerable to Vpnfilter.

The exact procedure for resetting a router can vary, though it usually involves pressing a pin or the end of a paperclip into a small pinhole button on the hardware, followed by connecting the device to a PC via ethernet to complete the initial configurat­ion. Linksys ( go.macworld.com/lnmu),

Mikrotik ( go.macworld.com/mtmw),

Netgear ( go.macworld.com/ngmw),

QNAP ( go.macworld.com/qnmw) and Tp-link ( go.macworld.com/tpmw) have all posted instructio­ns explaining how to factory reset your routers and otherwise protect against Vpnfilter.

Performing a little prep work beforehand can make the experience less of a hassle. Although you’ll want to change your router’s default administra­tive username and password, jot down your existing network name(s) and password before you reset your hardware. When you create a new network after factory resetting your router, it’s safe to use the same Wi-fi name and passwords as before. Doing so will let all your devices reconnect easily. ■

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Australia