Category: IT|Jun 8, 2018 | Author: Admin

Botnet That Previously Hacked Over 500,000 Routers Has Come Back Stronger

Share on

According to Telemetry data gathered this week, the VPN filter botnet is trying to make a comeback said security researchers. JASK and HreyNoise Intelligence revealed this matter on Friday which showed the same threat actor was built into the second iteration of the VPN filter which is attempting to compromise new routers and build a new VPNFilter.

According to Telemetry data gathered this week, the VPN filter botnet is trying to make a comeback said security researchers. JASK and HreyNoise Intelligence revealed this matter on Friday which showed the same threat actor was built into the second iteration of the VPN filter which is attempting to compromise new routers and build a new VPNFilter.

Most of the scans have looked for Mikrotik routers with port 2000 exposed to the network which are in Ukrainian locations. Furthermore, the old VPNFilter also consisted of C&C server which is dedicated to managing Ukrainian devices which are entirely separate from the initial botnet.

The public disclosure revealed that the group behind the updated version is APT28 which is a Russian cyber-espionage unit and was currently preparing to attack Ukraine’s IT infrastructure. The researchers of Cisco Talos revealed that this botnet’s existence and also notified the FBI which helped them take over the domain which is currently managed to use the VPN filter command and control infrastructure. This didn’t stop the group from starting a new attack and finding new devices to compromise on the network. The malware is considered as one of the most advanced pieces of IoT malware which compromises the system in a three-stage attack.

The first stage consists of a payload that can achieve boot persistence on devices which can also survive the reboot from routers. The second stage follows by the injection of a Remote Access Token (RAT) and for the third stage, the hackers use this RAT software to add malicious functionality to the router.

A report from Estonian Foreign Intelligence Service claimed that APT28 is a unit of Russian Military Main Intelligence Directorate (GRU) which is behind many cyber attacks on the past such as NotPetya ransomware and BlackEnergy attacks. The Ukrainian officials need to strong to survive the attack from the malware again as it has risen from the ashes.

Take your time to comment on this article.

Sponsored Ads:

Comments:


All versions of Windows are exposed

Category: Microsoft|Sep 25, 2021 | Author: Admin

Android's underappreciated upgrade advantage

Category: Google|Sep 24, 2021 | Author: Admin

No Electricity? A New Cooling System Uses Sunlight and Saltwater

Category: General|Sep 23, 2021 | Author: Admin

Slack begins rolling out video and audio message ‘clips’

Category: General|Sep 22, 2021 | Author: Admin

Roku's free OS 10.5 lets you dictate passwords, fixes pesky sound lags on headphones

Category: IT|Sep 21, 2021 | Author: Admin

Some good news and some strange news from Apple

Category: Apple|Sep 20, 2021 | Author: Admin

New Windows security updates break network printing

Category: Microsoft|Sep 19, 2021 | Author: Admin

Sent 700tb over 4 km of laser technology

Category: IT|Sep 18, 2021 | Author: Admin

'Massive' transatlantic data cable landed on beach in Bude

Category: Google|Sep 17, 2021 | Author: Admin

YouTube shuts down Discord music bot ‘Rythm’

Category: Google|Sep 16, 2021 | Author: Admin

Facebook's secret rules differentiate between the "elite" and most people

Category: General|Sep 15, 2021 | Author: Admin

Apple suddenly had to crisis-update the iPhone and Mac

Category: Apple|Sep 14, 2021 | Author: Admin

Epic is blocked forever on all Apple platforms

Category: Apple|Sep 13, 2021 | Author: Admin

NVIDIA To Launch GeForce RTX 30 SUPER ‘Ampere Refresh’ In January 2022, GeForce RTX 40 ‘Ada Lovelace’ GPUs in October 2022

Category: General|Sep 12, 2021 | Author: Admin

3 smart shortcuts for a curiously hidden Chrome OS command

Category: Google|Sep 11, 2021 | Author: Admin
more