Honolulu Star-Advertiser

Sunday, December 15, 2024 75° Today's Paper


Top News

Should you reboot your router like the FBI says?

ASSOCIATED PRESS

An LED-illuminated wireless router, seen in July 2008, in Philadelphia. Last week, the FBI recommended rebooting home and small office routers that could have been infected with disruptive malware, allegedly by sophisticated state-backed Russian hackers.

Last week, the FBI recommended rebooting home and small office routers that could have been infected with disruptive malware, allegedly by sophisticated state-backed Russian hackers. An estimated half million routers and network-attached storage devices have been infected.

But even the FBI acknowledges this step will only “temporarily disrupt” the malware. Here are some questions and answers about the situation:

Q: How can I tell if my router is infected?

A: Short answer: You probably can’t. Routers aren’t very consumer-friendly, and most people lack the ability to get deep enough inside the device to tell if it’s infected.

Q: If my router was infected and I reboot, is it safe?

A: No. Turning an infected router off and on again only removes some of the malware — such as elements that could snoop on your internet activity or even overwrite the basic code on your router, thus “bricking” it (that is, turning it into an inoperable brick). The core infection persists on reboot and there’s no simple way to delete it.

The good news is that last week, the FBI seized the command-and-control server that sends instructions to the infected routers, disrupting the zombie network that could be used to mount a crippling internet-based attack. The bad news is that the persistent malware is in listening mode, awaiting instructions. “So all the cards are still on the table,” said Craig Williams of Cisco’s Talos cyberthreat intelligence team, which identified the operation it calls VPNFilter.

Q: Why can’t I completely remove the malware from my router?

A: For starters, routers are difficult for ordinary users to fiddle with. They have publicly known vulnerabilities that aren’t easy for average users to patch and typically aren’t equipped with anti-virus software packages or intrusion protection systems. That said, if you can update your router’s “firmware” to the latest version — something you can often do via the router’s phone app or web interface — you should. It may not fix the problem, but it won’t hurt and may help.

Q: Which devices are affected and where can I learn more?

A: Cisco identified these companies as makers of affected devices: Linksys, Mikrotik, Netgear, TP-Link and QNAP. It said most of the infected routers are in Ukraine. You can find more details from Talos and the United States Computer Emergency Readiness Team. The FBI says it has nothing new to report beyond the announcement it put out May 25.

By participating in online discussions you acknowledge that you have agreed to the Terms of Service. An insightful discussion of ideas and viewpoints is encouraged, but comments must be civil and in good taste, with no personal attacks. If your comments are inappropriate, you may be banned from posting. Report comments if you believe they do not follow our guidelines. Having trouble with comments? Learn more here.