Skip to main content


How do I check my router for malware?


in reply to HiddenLayer555

Rather than test, why not just get the firmware from the manufacturer's site and flash the same firmware? Or update if there's something new?
This entry was edited (4 days ago)
in reply to hansolo

If the firmware is vulnerable, it's only a matter of time before it gets breached again.
in reply to floquant

Sure, but you can at least start any observations from a clean baseline.
in reply to hansolo

Wouldn't the old firmware still have to respond to and perform the flashing request? For example reading from a USB drive? Is it more likely to overwrite potentially malicious code compared to the reset button or automatic updates from the web admin panel?
This entry was edited (4 days ago)
in reply to HiddenLayer555

Good question, I expect it would depend on the router manufacturer.
in reply to HiddenLayer555

If you already want to experiment with pfSense/OPNSense, you could place it between your router and the ISP's and just inspect the traffic. You don't even need to pass traffic through it, you just need a single interface in promiscuous mode connected to the same network segment (switch)
in reply to HiddenLayer555

You said the ISP’s router is in bridge mode, which means your router is exposed to the wild, so it’ll be attacked as well, and of course it’s up to you to run a good firewall on it.

I don’t know how to test for malware, but I do know that basic consumer routers that can run OpenWRT are very cheap. I can’t speak to pfSense as I don’t have experience with it.

This entry was edited (4 days ago)
in reply to HiddenLayer555

check.labs.greynoise.io

Check the reputation of your IP address (in addition to the other comment suggesting reflashing the devices firmware)

If anything is reaching out en masse, your address will likely be reported and some sites will block you. This is not to say that you're 100% definitely clean, but that you're probably not in a botnet

in reply to HiddenLayer555

I'm not familiar with how malware like that masks but you can pretty much find any traffic with a tool like WireShark. It's just a matter of finding out how processes recreate themselves once killed.

If something lives in the storage of your router, specifically, I'd see about formatting the storage and flashing new firmware. As you stated, that may not solve anything.

Regardless of how they enter and what is installed where, once it's inside your home network it can pretty much access anything. If you wanna be fully secure you'd need a firewall and just block any traffic you don't specifically whitelist. As you can imagine, this is cumbersome.

Are you worried that something has infected your network devices? Do you have any reason to suspect something? In some countries, ISPs do some passive monitoring on what goes in and out of your home and if they see anything untoward they'll disable that bridge device and notify you.

in reply to HiddenLayer555

If you don't trust it ......Then why not simply replace it.? They are not that expensive anymore and peace of mind is worth something too.
Especially when switching to pfsense
in reply to HiddenLayer555

This entry was edited (4 days ago)
in reply to HiddenLayer555

What router?

Point Shodan or grey noise or something at your public ip. Find your public ip by disabling your computers vpn, asking google what your public ip is then comparing that to the address shown at your routers wan interface.

Another person said to just update it. Just update it. But before you do:

Look at freshtomato, openwrt, pfsense etc to see if any of the open firmwares support your hardware. You may like them better.

About the best you can do without opening it up, finding a uart and watching is to put a device you control between it and the isp device.