As far as we know, the VPNFilter malware doesn't currently put ASUS routers at risk, but the FBI believes it was created by a Russian state-sponsored cyber espionage group, so we can assume attackers are gunning for all SOHO routers.
Q1. How could you remove all malware from a router? I.e. how to fully reset RAM and persistent storage?
Stage 1 adds a worm to the crontab, which survives a reboot. So at a minimum one needs to reset the crontab. A better bet is to reset all code and state in RAM and flash memory. (Is NVRAM a part of flash memory?)
According to ASUS FAQ 1035717 of 2018/05/28, recent firmware has these two options:
By "Database" does ASUS mean the DHCP configuration and leases?
So would it suffice to Initialize, then re-flash the latest firmware, then reboot?
Can you trust the router's firmware-upgrade procedure to not reinfect the uploaded firmware?
Q2. How can you detect malware in the router?
Checksum the firmware?
Q3. If the attackers exploit unpatched vulnerabilities, what can you do to prevent reinfection?
If standard practices like setting a strong administration password and disabling remote administration aren't sufficient, is there anything you can do other than buy a different model router?
Q1. How could you remove all malware from a router? I.e. how to fully reset RAM and persistent storage?
Stage 1 adds a worm to the crontab, which survives a reboot. So at a minimum one needs to reset the crontab. A better bet is to reset all code and state in RAM and flash memory. (Is NVRAM a part of flash memory?)
According to ASUS FAQ 1035717 of 2018/05/28, recent firmware has these two options:
- Restore: Erases the Log / NVRAM
- Initialize: Erases the Log / NVRAM / Database
By "Database" does ASUS mean the DHCP configuration and leases?
So would it suffice to Initialize, then re-flash the latest firmware, then reboot?
Can you trust the router's firmware-upgrade procedure to not reinfect the uploaded firmware?
Q2. How can you detect malware in the router?
Checksum the firmware?
Q3. If the attackers exploit unpatched vulnerabilities, what can you do to prevent reinfection?
If standard practices like setting a strong administration password and disabling remote administration aren't sufficient, is there anything you can do other than buy a different model router?