Researchers have discovered seven additional third-stage modules in the VPNFilter malware that has been infecting hundreds of thousands of global networking devices in Ukraine and around the world since at least 2016.
Believed to be the creation of Russian APT group Fancy Bear, VPNFilter remains a credible threat, despite recent efforts taken to expose the campaign and seize one of its domains. Originally known to be capable of DDoS attacks, information wiping/bricking, and cyber espionage, it now appears that VPNFilter's additional third-stage modules allow it to more easily propagate from infected network devices to other endpoints, perform data filtering, and obfuscate or encrypted malicious traffic, particularly through encrypted tunneling.
"We now confirm that VPNFilter provides attackers all of the functionality required to leverage compromised network and storage devices to further pivot into and attack systems within the network environments that are being targeted," said a blog post published today by Cisco Systems' Talos threat research unit, which originally discovered and reported the threat last May.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.