Thursday, April 10, 2025
HomeCyber Security NewsVPNFilter Malware Adds Seven New Tools For Exploiting Network Devices

VPNFilter Malware Adds Seven New Tools For Exploiting Network Devices

Published on

SIEM as a Service

Follow Us on Google News

The VPNFilter malware is a globally deployed threat infected thousands of network devices across the globe, it is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations.

It was uncovered by Talos researchers, the malware infects more than 500,000 in at least 54 countries and the targeted devices are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the organization and NAS devices.

VPNFilter Malware adds Seven New Tools

Talos researchers observed the VPNFilter Malware adds additional third-stage modules to expand its ability to exploit endpoint systems and to encrypt malicious traffic.

- Advertisement - Google News

VPNFilter malware adds these seven additional third-stage modules

htpx – It is a is a third-stage module responsible for setting rules on iptables and to redirect the network traffic and to inspect the contents of the HTTP traffic.

ndbr – The ndbr is a multi-functional SSH tool that has the ability to perform port-scan other IPs.

nm – It is a network module that scans and map the local subnet from the compromised devices. It goes through all interfaces and starts by ARP scanning, if it gets ARP reply then send ICMP packets to discover the host.

netfilter – Module used to deny access to certain encrypted applications for victims that threat actors preferred to use.

portforwarding – The module is designed to forward the network traffic to the infrastructure specified by the attacker.

socks5proxy – To establish a SOCKS5 proxy on the compromised devices to communicate with the C2 server.

tcpvpn – Module allows to establish a Reverse-TCP VPN connection on the compromised devices. It allows a remote to access internal networks behind infected devices.

Stages of VPNFilter Malware Operation

Stage 1 – The malware ensures persistence, it can survive after a reboot, where most of the malware that targets internet-of-things devices does not survive after reboot.

Stage 2 – The malware with multiple capabilities such as file collection, command execution, data exfiltration, and device management.

Stage 3 – It acts as a plugin for Stage 2, it contains the sniffer module for collecting traffic data and communication module that allows Stage 2 malware to connect to C2 server through Tor Service.

“VPNFilter coupled with our new findings, we now confirm that VPNFilter provides attackers all of the functionality required to leverage compromised network and storage devices to further pivot into and attack systems within the network environments that are being targeted.” researchers said.

Related Read

Dangerous Android Malware that Steals Banking Credentials, Call Forwarding, Keylogging, and Ransomware Activities

Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...