Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/6/2018
05:53 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

VPNFilter Poses Broader Threat Than First Thought; Endpoints At Risk Too

New research shows the router and NAS system malware affects more vendor devices as well, Cisco Talos says.

The danger posed by the recently uncovered VPNFilter malware that has infected some 500,000 home-office routers and network attached storage devices worldwide may be substantially broader than initially assumed.

Researchers from Cisco Talos, who were the first to report on the threat last week say that new information from partners and the company's own research shows several more devices are being targeted than first thought.

Up to now, the vendors affected by VPNFilter were thought to be Linksys, NETGEAR, MikroTik, TP-Link and QNAP. The new data shows devices from six other vendors of small and home office routers and NAS systems are affected as well, including ASUS, Huawei, D-Link and ZTE.

Perplexingly, the new research also shows VPNFilter can be used to infect not just routers and networked storage devices but also the endpoint devices behind them. Enabling that capability is a newly discovered VPNFilter module for injecting malicious code into the web traffic flowing through a compromised device.

In addition, Cisco Talos researchers have uncovered a module that gives the threat actors behind the operation another way to remove traces of VPNFilter from an infected system by essentially bricking it.

It is bad enough that threat actors can infiltrate a vast number of routers and intercept traffic flowing through it, says Mounir Hahad, head of Juniper Threat Labs at Juniper Networks. "We now know that [they also have] the ability to silently, without any action from the user, infect the very endpoints we use," he says. "At this point, they can install keyloggers, backdoors or any other tools they need to exfiltrate the information that they are after."

The latest Cisco Talos update adds another dimension to the threat posed by VPNFilter, a highly modular piece of malware, which security researchers believe is being distributed by Russian state actor APT28.

Talos and others believe the malware can be used for a variety of operational purposes, including intelligence collection, to launch DDoS attacks and to obfuscate targeted attacks against organizations. Another major concern is the potential for the attackers to cause widespread damage by using VPNFilter to brick infected devices.

According to Talos, infected devices have been found in 54 countries. But a majority of compromised devices are in Ukraine which some have said lends credence to the notion that Russian state-actors are behind the malware campaign.

VPNFilter consists of a first stage component designed mainly to establish a persistent presence on an infected device and to download a separate stage two component. Unlike other malware targeting IoT devices, VPNFilter's first stage module is designed to persist even through a device reboot. Talos has described the stage 1 module as using multiple and often, redundant, command and control mechanisms for getting to the IP address for downloading the second component.

VPNFilter's stage 2 component is more of a standard-issue data collection, data exfiltration and command execution module, with an additional and especially nasty self-destruct capability. The kill feature allows the threat actors behind VPNFilter to overwrite a critical piece of firmware on an infected device and to reboot it to a completely unusable state. Security researchers have warned that if APT28 were to use the capability, tens of thousands of users could find themselves abruptly cut off from the Internet.

In addition to the first two modules, Cisco Talos has said the authors of VPNFilter have developed what appear to be several stage 3 plug-in modules that can be used to extend the malware's functionality. In its initial report on the threat, Talos described two that it had discovered: a packet sniffer for stealing web credentials and to monitor SCADA protocols and a separate module for enabling the malware to communicate via Tor.

VPNFilter's stage 2 and stage 3 components are not designed to persist through a system reboot. But the fact that the stage 1 module can persist means threat actors can keep infecting the same devices. Security researchers have said the only way to get rid of the first module is to do a factory reset.

The two new modules that Talos reported in its update this week are both stage 3 components. The module for injecting malicious code into web traffic enables threat actors to deliver exploits directly to endpoints says Craig Williams, director of outreach with Cisco Talos. "If an attacker can inject code into your web browser they can essentially do anything—steal passwords, run crypto miners, install software, etc.," he says.

The other stage-3 module provides a self-destruct capability to any VPNFilter stage-2 module that doesn't have it already. "Talos originally reported a capability that would allow the attackers to render some devices unusable," Williams says. "Now we see that bad actors continue to evolve the attack and have developed a way to shut down devices and cover their tracks across all platforms."

It continues to remain unclear for the moment what exploits and vulnerabilities the attackers have been using to gain initial access to the affected routers and NAS devices, he noted.

“These new findings further indicate the very real potential that VPNFilter was intended as an exploit for espionage, spying and other activities," says Ashley Stephenson, CEO of Corero Network Security. VPNFilter's capabilities "are more commonly in the realm of a nation state surveillance or sabotage mission, rather than a commercially motivated data theft or DDoS," Stephenson says.

Related Content:

 

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SRADANDT531
50%
50%
SRADANDT531,
User Rank: Apprentice
6/7/2018 | 11:57:30 AM
Missing effected devices
"devices from six other vendors of small and home office routers and NAS systems are affected as well, including ASUS, Huawei, D-Link and ZTE."

Why only list 4 of the six others?  Sloppy reporting IMO.

The Talos site lists Ubiquiti and Upvel in addition to the ones listed here.
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...