VPNFilter Malware May Be Even More Dangerous Than We Thought

VPNFilter Malware May Be Even More Dangerous Than We Thought

US law enforcement revealed several weeks ago that consumer routers all over the world had been infected with dangerous malware. Owners were advised to rest the devices, but that was only a temporary fix. Now, the news is even worse. The VPNFilter malware affects more device models than previously thought, and it has a previously unknown ability that could put you at risk online.

Security researchers have traced VPNFilter back to Fancy Bear, a hacking team backed by Russian intelligence. Fancy Bear is most famous for carrying out the spear phishing attack on Clinton advisor John Podesta that yielded thousands of private emails. The team’s current operation is much less focused, though. We already knew VPNFilter affected routers from Cisco/Linksys, MikroTik, NETGEAR, and TP-Link. The new wrinkle is there are even more models and manufacturers vulnerable to VPNFilter.

According to the latest report from Cisco Talos, additional models from Linksys, MicroTik, Netgear, and TP-Link are vulnerable to VPNFilter. Plus, devices from Asus, D-Link, Upvel, Huawei, and ZTE are on the list now. There are now dozens of models and as many as 500,000 individual routers infected with VPNFilter. You can restart them to clear the actively malicious packages, but they could just come back.

US law enforcement previously warned everyone to restart their routers to clear the malware, but that only cleared the second and third stages of VPNFilter. The first stage remained active, and that’s the piece that gives the hackers access to install the active second and third stages. Routers vulnerable to VPNFilter usually run older firmware with known security holes, and many of them don’t have updates available.

Cisco was good enough to make a logo for Fancy Bear’s malware.
Cisco was good enough to make a logo for Fancy Bear’s malware.

The only sure fix is a firmware update, and most routers don’t do that automatically even if patched firmware is available. You’ll definitely want to look into that, too. An active VPNFilter infection is even more dangerous than we thought. Researchers have discovered that VPNFilter can run a man-in-the-middle attack. That allows the hackers to intercept web traffic before it gets to you and change what you see or steal sensitive data like passwords. While researchers initially thought VPNFilter was intended mainly to run attacks on larger targets, it’s beginning to look more like the users themselves are the targets.

If you have one of the devices on the latest target list, it would be a good idea to trash it and get a new router. Unfortunately, many of the infected routers will continue to operate for years to come because most consumers simply aren’t paying attention.

Continue reading

Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal
Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal

Known simply as 2FA Authenticator, the app picked up more than 10,000 installs until security researchers identified it as a vehicle for trojan-dropper malware.

Clever Malware Masquerades as Windows 11 Installer
Clever Malware Masquerades as Windows 11 Installer

A Russian website disguised as an official Microsoft page is distributing an "upgrade installer" that won't get you Windows 11. What it will get you is a bunch of malware.

Researchers Devise Malware That Runs When an iPhone is Powered Off
Researchers Devise Malware That Runs When an iPhone is Powered Off

The iPhone's low-power mode allows users to access Express cards and locate lost devices even when the phone is turned off—but it also presents a concerning security vulnerability.

Google Warns of Sophisticated Malware Distributed With The Help of ISPs
Google Warns of Sophisticated Malware Distributed With The Help of ISPs

According to Google's Threat Analysis Group (TAG), this spyware was developed by an Italian company called RCS Labs. The firm claims to be on the right side of the law, but that doesn't change the fact its software is being used to breach user privacy.