Sunday, December 22, 2024
HomeCyber Security NewsVPNFilter Malware Adds Seven New Tools For Exploiting Network Devices

VPNFilter Malware Adds Seven New Tools For Exploiting Network Devices

Published on

SIEM as a Service

The VPNFilter malware is a globally deployed threat infected thousands of network devices across the globe, it is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations.

It was uncovered by Talos researchers, the malware infects more than 500,000 in at least 54 countries and the targeted devices are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the organization and NAS devices.

VPNFilter Malware adds Seven New Tools

Talos researchers observed the VPNFilter Malware adds additional third-stage modules to expand its ability to exploit endpoint systems and to encrypt malicious traffic.

- Advertisement - SIEM as a Service

VPNFilter malware adds these seven additional third-stage modules

htpx – It is a is a third-stage module responsible for setting rules on iptables and to redirect the network traffic and to inspect the contents of the HTTP traffic.

ndbr – The ndbr is a multi-functional SSH tool that has the ability to perform port-scan other IPs.

nm – It is a network module that scans and map the local subnet from the compromised devices. It goes through all interfaces and starts by ARP scanning, if it gets ARP reply then send ICMP packets to discover the host.

netfilter – Module used to deny access to certain encrypted applications for victims that threat actors preferred to use.

portforwarding – The module is designed to forward the network traffic to the infrastructure specified by the attacker.

socks5proxy – To establish a SOCKS5 proxy on the compromised devices to communicate with the C2 server.

tcpvpn – Module allows to establish a Reverse-TCP VPN connection on the compromised devices. It allows a remote to access internal networks behind infected devices.

Stages of VPNFilter Malware Operation

Stage 1 – The malware ensures persistence, it can survive after a reboot, where most of the malware that targets internet-of-things devices does not survive after reboot.

Stage 2 – The malware with multiple capabilities such as file collection, command execution, data exfiltration, and device management.

Stage 3 – It acts as a plugin for Stage 2, it contains the sniffer module for collecting traffic data and communication module that allows Stage 2 malware to connect to C2 server through Tor Service.

“VPNFilter coupled with our new findings, we now confirm that VPNFilter provides attackers all of the functionality required to leverage compromised network and storage devices to further pivot into and attack systems within the network environments that are being targeted.” researchers said.

Related Read

Dangerous Android Malware that Steals Banking Credentials, Call Forwarding, Keylogging, and Ransomware Activities

Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...

Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker...

Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution

A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could...

Foxit PDF Editor Vulnerabilities Allows Remote Code Execution

Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit...