FBI Warns of Russian Router Breach
The FBI released a warning on Friday (May 25, 2018) about a security breach by hackers in Russia that targets small office and home office routers as well as some storage servers. While the exact method used to access the devices is unknown, the intruders are known to have used publicly-known security flaws to breach the devices.
For several months, Cisco Talos has worked with both public and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor’s widespread use of a sophisticated modular malware system called VPNFilter. Although they have not completed their research, recent events has convinced the security group to share their findings so that the affected parties can take the appropriate action to defend themselves.
There are estimated over 500,000 devices in over 54 countries that have been effected by the VPNFilter malware. The behavior of this malware on networking equipment is quite concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols. Also, the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en-masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.
The known devices affected by VPNFilter are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office (SOHO) space, as well as QNAP network-attached storage (NAS) devices. The malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en-masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.William Largent
Brief Technical Analysis
The VPNFilter malware is a multi-stage platform with versatile capabilities to support both intelligence gathering and destructive cyber attack operations.
- The stage 1 malware persists through a reboot, which sets it apart from most other malware that targets internet-of-things devices because malware normally does not survive a reboot of the device. The main purpose of stage 1 is to gain a persistent foothold and enable the deployment of the stage 2 malware.
- The stage 2 malware, which does not persist through a reboot, possesses capabilities that we have come to expect in an intelligence-collection platform, such as file collection, command execution, data exfiltration, and device management.
The following devices are known to be affected by this threat.
MikroTik Devices (Physical/Virtual)