Russians are targeting home routers. Here's how to protect yourself
Hackers are always on the hunt for vulnerable routers. Your router, after all, is your main gateway to the internet. It is an important component in our internet-connected households and businesses.
We’ve been warning you about how vulnerable your router can be if it’s not configured properly. Hackers can hijack it to harvest your personal information, commandeer your smart devices, install malware on your computer and redirect your traffic to fake websites.
And it’s not just cybercriminals that we need to guard against. State-sponsored hackers that have completely different motives are equally dangerous too.
Russian hackers are after your router
A few weeks ago, the United States Computer Emergency Readiness Team (US-CERT) issued an alert about Russian state-supported hackers carrying out attacks against a large number of home routers in the U.S.
These Russian hackers are reportedly using known weaknesses to infiltrate residential routers and utilize them to get a foothold on a network and execute these further attacks:
- identify other vulnerable devices in the network
- read your gadget configurations
- map your internal network
- harvest usernames and passwords
- impersonate administrators
- modify firmware
- modify operating systems
- change configurations
- spy on your traffic and redirect it through Russian-controlled servers
What can happen when your router is compromised?
As you can see, when your router is compromised, a hacker can do all sorts of malicious activity, not just on the router itself, but on every connected device in your network.
DNS hijacking
One of the more popular router hacking techniques is DNS hijacking. DNS hijacking of unsecured Wi-Fi routers is nothing new, of course, and we’ve talked about this technique before with malware like Switcher and other malicious DNS changers.
It’s when hackers alter your router’s DNS settings to intercept your traffic, then redirect you to fake versions of legitimate sites designed to steal your credentials. This includes banking information, and even the codes you use for two-factor authentication.
Basically, if your router’s DNS servers have been switched to the attackers’, they can hijack and redirect all your traffic to any site they want. It’s a serious problem, indeed. Once your router is compromised and its DNS settings altered, potentially all of the computers and gadgets in your network can be exploited and targeted.
DDoS attacks
Another common use for router hijacking is for executing distributed-denial-of-service (DDoS) attacks.
DDoS is an attack where a targeted website is flooded by an overwhelming amount of requests from millions of connected machines in order to bring it down. Traditionally, these attacks are launched from compromised computers and mobile gadgets collectively nicknamed “botnet.”
This means unsecured routers, printers, IP web cameras, DVRs, cable boxes, connected “smart” appliances such as Wi-Fi light bulbs and smart locks can be hijacked and involved in cyberattacks without the owner knowing about it.
How to protect your router from attacks
Here are various ways to shield your router from attacks, making it harder to infiltrate and hack.
1. Update your firmware regularly
With hackers constantly looking for firmware flaws to exploit, keeping your router’s firmware up to date is a must.
The process is not as hard as it sounds. Once you’re in the router’s admin page, check for a section called “Advanced” or “Management” to look for firmware updates, then just download and apply as required.
You should check for router firmware updates at least once every three months.
Click here to learn more about updating your router’s firmware.
2. Change the default passwords
When you installed your router, did you remember to do this one critical step – changing its default administrator password?
Basically, if someone other than you can get in your router’s admin page, then he/she can change any setting they want.
Make sure you’ve changed the default router password. Every hacker worth his salt has access to all the default passwords of every router brand, so you need to create one of your own that’s strong.
Click here to learn how to find your router’s password (then change it!)
3. Turn off remote administration
While you’re in your router’s administrator page, you can turn off remote administration for better security.
Remote administration is a feature that allows you to log into your router over the internet and manage it. If you’ve ever called tech support, you may have experienced something similar:
Remote administration is a handy tool, especially when you need to fix a problem, but it leaves your computer vulnerable to hackers.
Unless you absolutely need it, turn this feature off. You can find this under your router settings, usually under the “Remote Administration” heading.
While you’re at it, you can turn off older internet management protocols like Telnet, TFTP, SNMP, and SMI.
4. Check your DNS settings
To check your router’s DNS settings use an online tool.
To prevent threats from misconfigured DNS settings, you can also manually review your DNS servers and change them to secure ones like CloudFlare or Quad9.
Click the links provided for detailed steps.
5. Turn on your guest network
There is another simple way to protect your more critical personal devices. Just put them on a separate network that’s different from your main one.
You can do this by setting up a completely different Wi-Fi router or by simply enabling your router’s “Guest Network” option, a popular feature for most routers.
Guest networks are meant for visitors to your home who might need a Wi-Fi internet connection but you don’t want them gaining access to the shared files and devices within your network.
This segregation will also work for your smart appliances and it can shield your main devices from specific Internet-Of-Things attacks.
Click here for how turning on your guest network can protect your home.
We have more router security tips! For further reading, click here to learn how to make your router hack-proof.
Test your firewall to make sure it’s working
Your firewall is an essential tool that keeps hackers from seeing your computer online. Even if they know your computer’s location and IP address, the firewall keeps them from accessing your network. But many don’t know if they have a firewall or not, or if it’s actually working.
Here’s a quick way to test your network and your firewall ports to make sure you’re protected.
How your iPhone can be hacked in 6 minutes
Apple users beware! There is a huge risk after new hacking programs were uncovered that can break your passcode and gain access to your phone in just 6.5 minutes! The programs have been traced back to a secret, private company in Atlanta. They are using programs to decode encrypted data. Once unlocked, it downloads all of your content.
How cybercriminals are using your router to spread malware
Scammers will never run out of ideas to exploit you. It’s like playing a game of cybersecurity whack-a-mole as criminals think of infinite ways to secretly steal your hard-earned cash. This newly discovered malware is a nasty spyware/adware Android app that strikes by using a technique known as DNS hijacking.
4 clever ways to prevent spying and 1 way to spy
Cybersecurity is much like driving a car: one accident can change everything, sending ripples of misfortune through every aspect of your life. Protecting your devices may seem excessive, even silly. Then someone drains your bank account. Or your identity is stolen. And you would do anything to go back in time.
Cybercriminals secretly use your Chrome extensions to steal from you
Be careful! Cybercriminals are using web browser extensions to secretly use your computer for their own financial gain. One problem with extensions is, once you install them, they just sit there. Most people don’t constantly monitor all the extensions they’ve added, so cybercriminals take advantage of that by tapping into them to steal your ID, use your computer strength to cryptomine and worse.
If you want to protect your sensitive data you must use this tool
Hackers and cybercriminals are out to get you. Heck, nefarious governments are spying on you, too. This is a serious problem in the digital age we’re living in. Fortunately, you do not have to be an easy target. It’s fairly straightforward to remain anonymous when you’re online by using a Virtual Private Network, or VPN.
How to make your router hack-proof
It is not just about the potential loss of bandwidth, slowdowns or botnet attacks. Securing your router can also shield you from unwelcome connections that may be using your network for illegal activities. Remember, when law enforcement traces the illegal activity, you – the router’s owner – are left being held responsible.
It's National Password Day! 7 steps for crafting the perfect password
If someone figures out the password to your email, you’re in trouble. Bank account? Even worse. Once hackers access your personal information, they can wreck your finances, and you may feel the repercussions of that break-in for years. Don’t worry, I can help.
This file type is the most used in cyberattacks
Phishing emails with malicious attachments or links are a favorite of the cybercriminal. These types of attacks can be a very effective tool for fraudsters, especially in tricking the untrained eye. But among all the file types that can be used for duping potential victims, this well-known format is the most popular for cyberattacks. Read on and you might be surprised.
U.S. intelligence agencies warn against using this Chinese smartphone
When it comes to the world of smartphones, your first decision might be the toughest. That is whether you want to be an Apple or Android user. If you go with Android, you will have tons of phone manufacturers to choose from. However, U.S. intelligence agencies are warning consumers against using one Chinese brand in particular.
Massive Equifax data breach is worse than originally thought
It’s only been a matter of months since we found out about the massive Equifax data breach that exposed over 145 million Americans’ critical information. Stolen data included Social Security numbers, and as you know, we can never replace them. Well, brace yourself, it turns out that the Equifax breach is even worse than reported.
How cybercrooks are using your LinkedIn profile to steal your info
LinkedIn is a popular tool for professionals and businesses. Jobseekers and companies use it for building a vast network of connections. However, in the hands of a clever and tenacious cybercriminal, LinkedIn can reveal more information about you and your company than you think.
Warning! This Netflix scam could empty your bank account
Netflix has nearly 100 million subscribers worldwide, and I’m sure you’re one of them or know someone who is. That’s what makes this so worrisome. Now, cybercriminals are targeting Netflix users to get into your bank account and steal your money.