VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
The malware is believed to target networking devices, although the malware’s initial infection vector is still unclear. Talos, which first reported this attack, claims that it has impacted at least 500,000 networking devices during the last few years. The malware can persist on infected devices and can steal website credentials and monitor Modbus SCADA protocols. It also implements file collection, command execution, data extraction, and device management and, even worse, it can render some or all of the infected devices unusable.
The known devices affected by VPNFilter are some network-attached storage (NAS) devices such as Linksys, MikroTik, Netgear, and TP-Link networking equipment in the small and home office (SOHO) space, as well at QNAP.
Malware infection stages
VPNFilter has a three-stage infection.
Stage 1 completes the persistence on the system and uses multiple control mechanisms to find and connect the Stage 2 deployment server.
Stage 2 focuses on file collection, command execution, data extraction, and device management. Some versions possess a self-destruct capability to render itself unusable.
Stage 3 includes two known modules:
- A traffic sniffer to steal website credentials and monitor Modbus SCADA protocols
- Tor to communicate with anonymous addresses
Indicators of compromise and sample hashes
URLs and IPs
- First-Stage Malware
- Second-Stage Malware
- Third-Stage Malware
Coverage and mitigation
The aforementioned IOCs are covered as follows:
- Detection names for files: Linux/VPNFilter and Linux/VPNFilter.a
- V3 DAT with coverage version: 3353
- V2 DAT with coverage version: 8902
- All samples are GTI classified as malware
- All relevant URLs are GTI classified
Further recommendations from the Talos threat research team:
- Reboot SOHO routers and NAS devices to remove the potentially destructive, nonpersistent Stage 2 and Stage 3 malware
- Work with the manufacturer to ensure that your device is up to date with the latest patches. Apply the updated patches immediately.
ISPs should work aggressively with their customers to ensure their devices are patched to the most recent firmware/
More antivirus and malware news?
- New Android ‘on-body detection’ leaves your phone unlocked as long as you keep moving
- Microsoft Skype for Business and Lync Server CVE-2015-2536 Cross Site Scripting Vulnerability
- Google Brings Security Analytics to G Suite
- Slow connections to email.psu.edu, webmail incoming mail slow
- Seriously, this is how the Syrian Electronic Army hacked The Onion
- 3D printed gun plans pulled after US State Department objects
- Self driving cars learn (from us) about who to sacrifice in a crash
- Cryptocurrency startup LoopX exit scams with $4.5M in ICO
- D&S Communications buys the assets of failed Mako Networks
- Is Apple still all about the show?