Home / Reviews / VPNFilter Malware Sinks Its Teeth Into More Routers

VPNFilter Malware Sinks Its Teeth Into More Routers

Hacked Wireless Local Area Network Router

The Wi-Fi router-killing malware known as VPNFilter is more dangerous than previously thought. The malicious code can actually infect over 70 different device models, up from a mere dozen.

SecurityWatch

Last month, Cisco warned the public about the malware, which contains a self-destruct function that can brick a device. The company estimates that at least 500,000 wireless and broadband routers across the globe have so far been infected.

Since Cisco went public, the company has noticed the malware expand its targets. The malicious code is now going after products from Asus, D-Link and Huawei, in addition to attacking more models from Netgear and MikroTik.

On top of all this, Cisco has discovered a new capability in VPNFilter; it can secretly inject malicious content over the web traffic that passes through an infected router. The capability lets VPNFilter stage what's called a man-in-the-middle attack so that it can spy on victims and steal their sensitive data, Cisco's Talos security group said in a blog post on Wednesday.

"These new discoveries have shown us that the threat from VPNFilter continues to grow," it said.

Who built VPNFilter isn't definitely known, but the US Justice Department is pointing fingers at Russia; it's blamed the malware's development on a state-sponsored hacking group from the Kremlin known as a Fancy Bear or APT28. When Cisco discovered the malware, it noted that the malicious code was spreading at an "alarming rate" in the Ukraine.

What's clear is that VPNFilter is a disturbing threat. When the malware infects, it can download a module that lets the malicious code intercept and manipulate web traffic that passes through the router. It'll also attempt to downgrade HTTPS encrypted connections to HTTP, so that any sensitive data can be exposed in clear text and collected.

Related

The VPNFilter has been able to attack so many router models by targeting known vulnerabilities in the devices. Many of these routers are built with weak default passwords or contain software bugs that remain unpatched.

What makes VPNFilter particularly nasty is that it's hard to delete. Rebooting your router can temporarily remove the router-bricking and spying functions of the malware, but not all the malicious code. To fully clear it, you'll have to initiate a hard reset, which will restore the router's factory settings. However, to prevent re-infection, you'll have to look into patching the router with whatever security update your vendor can provide. PCMag has a guide for more details.

A full list of the affected products can be found below.

ASUS DEVICES:

  • RT-AC66U (new)
  • RT-N10 (new)
  • RT-N10E (new)
  • RT-N10U (new)
  • RT-N56U (new)
  • RT-N66U (new)

D-LINK DEVICES:

  • DES-1210-08P (new)
  • DIR-300 (new)
  • DIR-300A (new)
  • DSR-250N (new)
  • DSR-500N (new)
  • DSR-1000 (new)
  • DSR-1000N (new)

HUAWEI DEVICES:

  • HG8245 (new)

LINKSYS DEVICES:

  • E1200
  • E2500
  • E3000 (new)
  • E3200 (new)
  • E4200 (new)
  • RV082 (new)
  • WRVS4400N

MIKROTIK DEVICES:

  • CCR1009 (new)
  • CCR1016
  • CCR1036
  • CCR1072
  • CRS109 (new)
  • CRS112 (new)
  • CRS125 (new)
  • RB411 (new)
  • RB450 (new)
  • RB750 (new)
  • RB911 (new)
  • RB921 (new)
  • RB941 (new)
  • RB951 (new)
  • RB952 (new)
  • RB960 (new)
  • RB962 (new)
  • RB1100 (new)
  • RB1200 (new)
  • RB2011 (new)
  • RB3011 (new)
  • RB Groove (new)
  • RB Omnitik (new)
  • STX5 (new)

NETGEAR DEVICES:

  • DG834 (new)
  • DGN1000 (new)
  • DGN2200
  • DGN3500 (new)
  • FVS318N (new)
  • MBRN3000 (new)
  • R6400
  • R7000
  • R8000
  • WNR1000
  • WNR2000
  • WNR2200 (new)
  • WNR4000 (new)
  • WNDR3700 (new)
  • WNDR4000 (new)
  • WNDR4300 (new)
  • WNDR4300-TN (new)
  • UTM50 (new)

QNAP DEVICES:

  • TS251
  • TS439 Pro
  • Other QNAP NAS devices running QTS software

TP-LINK DEVICES:

  • R600VPN
  • TL-WR741ND (new)
  • TL-WR841N (new)

UBIQUITI DEVICES:

  • NSM2 (new)
  • PBE M5 (new)

UPVEL DEVICES:

  • Unknown Models* (new)

ZTE DEVICES:

  • ZXHN H108N (new)

Check Also

It Takes Just $200 to Tie Cell Networks in Knots

At the Black Hat conference, a researcher showed fundamental flaws in cellular network design that can degrade service and potentially knock networks offline without much effort.

Leave a Reply

Your email address will not be published. Required fields are marked *

Disclaimer: Trading in bitcoins or other digital currencies carries a high level of risk and can result in the total loss of the invested capital. theonlinetech.org does not provide investment advice, but only reflects its own opinion. Please ensure that if you trade or invest in bitcoins or other digital currencies (for example, investing in cloud mining services) you fully understand the risks involved! Please also note that some external links are affiliate links.