{"id":19741,"date":"2022-06-08T20:48:45","date_gmt":"2022-06-08T16:48:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/router-malware\/19741\/"},"modified":"2022-06-08T20:48:45","modified_gmt":"2022-06-08T16:48:45","slug":"router-malware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/router-malware\/19741\/","title":{"rendered":"The hidden threats of router malware"},"content":{"rendered":"<p>You check your computer for viruses every week, <a href=\"https:\/\/www.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/39911\/\" target=\"_blank\" rel=\"noopener nofollow\">update systems and programs promptly<\/a>, use strong passwords and generally take care online\u2026 yet for some reason your internet is slow and some websites deny access? It could be malware not on your computer, but in the router.<\/p>\n<h2>Why routers?<\/h2>\n<p>Cybercriminals target routers largely for two reasons. First, because all network traffic goes through these devices; second, you can\u2019t scan a router with a regular antivirus. So malware that has set up shop in the router has plenty of opportunities to attack, and way less chance of being detected \u2014 let alone deleted. Let\u2019s now talk about some things cybercriminals can do with an infected router.<\/p>\n<h2>Create a botnet<\/h2>\n<p>One of the most common cases is when an infected router joins a botnet; that is, a network of devices that send myriads of requests to a particular website or online service as part of a DDoS attack. The goal of the attackers is to overload the targeted service to such an extent that it slows down and eventually fails.<\/p>\n<p>Meanwhile, it\u2019s ordinary users whose routers are hijacked that suffer slower internet speeds because their routers are busy sending malicious requests, and only handle other traffic when they pause for breath.<\/p>\n<p>According to our data, routers in 2021 were most actively attacked by two malware families: Mirai and M\u0113ris, with the former leading by a huge margin \u2014 accounting for almost half of all attacks on routers.<\/p>\n<h3>Mirai<\/h3>\n<p>This notorious malware family with the sweet-sounding name (meaning \u201cfuture\u201d in Japanese) has been known since 2016. Besides routers, it\u2019s known to infect IP cameras, smart TVs, and other IoT devices, including corporate ones, such as wireless controllers and digital advertising displays. Initially conceived to carry out large-scale DDoS attacks on Minecraft servers, the Mirai botnet was later unleashed on other services. The source code of the malware has long been leaked online and forms the basis of ever more new variants.<\/p>\n<h3>M\u0113ris<\/h3>\n<p>Not for nothing does M\u0113ris mean \u201cplague\u201d in Latvian. It has already affected thousands of high-performance devices \u2014 mostly MikroTik routers \u2014 and linked them into a network for DDoS attacks. For instance, during an <a href=\"https:\/\/therecord.media\/cloudflare-says-it-mitigated-a-record-breaking-17-2m-rps-ddos-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">attack on a U.S. financial company in 2021<\/a>, the number of requests from the network of M\u0113ris-infected devices reached 17.2 million per second. A few months later, the botnet attacked several <a href=\"https:\/\/threatpost.com\/yandex-meris-botnet\/169368\/\" target=\"_blank\" rel=\"nofollow noopener\">Russian financial and IT companies<\/a>, with a record 21.8 million requests per second.<\/p>\n<h2>Steal data<\/h2>\n<p>Some router-infecting malware can do even more serious damage, such as steal your data. When online, you send and receive a lot of important information: payment data in online stores, credentials on social networks, work documents by email. All of this information, along with the rest of your network traffic, inevitably passes through the router. During an attack, the data can be intercepted by malware and fall straight into the cybercriminals\u2019 hands.<\/p>\n<p>One such data-stealing piece of malware is <a href=\"https:\/\/ics-cert.kaspersky.com\/publications\/news\/2018\/05\/28\/vpnfilter\/\" target=\"_blank\" rel=\"noopener\">VPNFilter<\/a>. By infecting routers and NAS servers, it gains the ability to collect information and control or disable the router.<\/p>\n<h2>Spoof websites<\/h2>\n<p>Malware lodged in the router can surreptitiously redirect you to pages with ads or malicious sites instead of the ones you want to visit. You (and even your browser) will think you\u2019re accessing a legitimate website, when in fact you\u2019re in the hands of cybercrooks.<\/p>\n<p>It works like this: when you enter the URL of a site (say, google.com) in the address bar, your computer or smartphone sends a request to a special DNS server, where all registered IP addresses and their corresponding URLs are stored. If the router is infected, instead of a legitimate DNS server, it may send requests to a fake one that responds to the \u201cgoogle.com\u201d query with the IP address of a completely different site \u2014 one that might be <a href=\"https:\/\/www.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/26802\/\" target=\"_blank\" rel=\"noopener nofollow\">a phishing one<\/a>.<\/p>\n<p>The Switcher Trojan was doing precisely that: infiltrating router settings and specifying a malicious DNS server as the default. Naturally, all data entered on the fake pages leaked to the attackers.<\/p>\n<h2>How does malware get into routers?<\/h2>\n<p>There are two main ways to plant malware in a router: by guessing the admin password, or exploiting a vulnerability in the device.<\/p>\n<h3>Password guessing<\/h3>\n<p>All routers of the same model tend to have the same admin password in the factory settings. Not to be confused with the network security key (the string of characters you enter to connect to Wi-Fi), the admin password is used to get inside the router settings menu. If the user unwittingly left the factory settings unchanged, attackers can easily guess the password \u2014 especially if they know the router brand \u2014 and infect the router.<\/p>\n<p>Recently however, manufacturers have started taking security more seriously by assigning a unique random password to each particular device, making this method less effective. But guessing the right combination for older models is still child\u2019s play.<\/p>\n<h3>Vulnerability exploitation<\/h3>\n<p>Router vulnerabilities are holes in your gateway to the internet through which all kinds of threats can stroll right into your home or corporate network\u00a0\u2014 or maybe just sit in the router itself, where detection is less likely. The above-mentioned M\u0113ris botnet does just that, exploiting unpatched vulnerabilities in MikroTik routers.<\/p>\n<p>According to <a href=\"https:\/\/securelist.com\/router-security-2021\/106711\/\" target=\"_blank\" rel=\"nofollow noopener\">our research<\/a>, several hundred new vulnerabilities have been discovered in routers in the past two years alone. To secure weak spots, router vendors release patches and new firmware versions (essentially routers\u2019 operating system updates). Unfortunately, many users simply do not realize that the router software needs to be updated, just like other programs.<\/p>\n<h2>How to protect your network?<\/h2>\n<p>If you want to secure your home or corporate router and keep your data safe:<\/p>\n<ul>\n<li>At least once a month, check the manufacturer\u2019s website for the latest router firmware updates. Install them as soon as they become available. For some models, patches arrive automatically, but sometimes you have to install them manually. Information about updating your device\u2019s software can also be found on the vendor\u2019s website.<\/li>\n<li>Create a long, strong admin password for your router. And so as not to forget the combination, use a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/li>\n<li>If you are skilled enough or you find instructions (on that same vendor\u2019s website, for example), disable remote access to the router admin settings.<\/li>\n<li>Configure <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-home-wifi\/13371\/\" target=\"_blank\" rel=\"noopener nofollow\">Wi-Fi correctly<\/a>: think up a unique password, use strong wireless encryption standard, and set up <a href=\"https:\/\/www.kaspersky.com\/blog\/guest-wifi\/23843\/\" target=\"_blank\" rel=\"noopener nofollow\">guest networks<\/a> so that unscrupulous or just careless guests and neighbors do not spread malware on your network from their infected devices.<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/vpn-secure-connection?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener\">VPN app<\/a> that will encrypt all outbound information before passing it to the router, keeping it safe from cybercriminals even if they have infected the device.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n","protected":false},"excerpt":{"rendered":"<p>Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.<\/p>\n","protected":false},"author":2484,"featured_media":19742,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486,9],"tags":[1032,1012,1245,131,174],"class_list":{"0":"post-19741","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-ddos","10":"tag-internet","11":"tag-routers","12":"tag-tips","13":"tag-wi-fi"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/router-malware\/19741\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/router-malware\/24258\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/router-malware\/9956\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/router-malware\/26586\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/router-malware\/24544\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/router-malware\/24904\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/router-malware\/27267\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/router-malware\/26844\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/router-malware\/33319\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/router-malware\/10767\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/router-malware\/44539\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/router-malware\/19023\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/router-malware\/19568\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/router-malware\/28888\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/router-malware\/32536\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/router-malware\/28317\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/router-malware\/25107\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/router-malware\/30620\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/router-malware\/30369\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19741"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19742"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}