Home

Jun 8, 2018

Botnet That Previously Hacked Over 500,000 Routers Has Come Back Stronger

authorarticle: Master3395
linksys-wifi-router-hacking-tool.png
video: 
youtube: 
sources: latesthackingnews.com
keywords: attack, Ukrainian Routers, VPN Filter
Category: IT
Posted by: Admin

According to Telemetry data gathered this week, the VPN filter botnet is trying to make a comeback said security researchers. JASK and HreyNoise Intelligence revealed this matter on Friday which showed the same threat actor was built into the second iteration of the VPN filter which is attempting to compromise new routers and build a new VPNFilter.

According to Telemetry data gathered this week, the VPN filter botnet is trying to make a comeback said security researchers. JASK and HreyNoise Intelligence revealed this matter on Friday which showed the same threat actor was built into the second iteration of the VPN filter which is attempting to compromise new routers and build a new VPNFilter.

Most of the scans have looked for Mikrotik routers with port 2000 exposed to the network which are in Ukrainian locations. Furthermore, the old VPNFilter also consisted of C&C server which is dedicated to managing Ukrainian devices which are entirely separate from the initial botnet.

The public disclosure revealed that the group behind the updated version is APT28 which is a Russian cyber-espionage unit and was currently preparing to attack Ukraine’s IT infrastructure. The researchers of Cisco Talos revealed that this botnet’s existence and also notified the FBI which helped them take over the domain which is currently managed to use the VPN filter command and control infrastructure. This didn’t stop the group from starting a new attack and finding new devices to compromise on the network. The malware is considered as one of the most advanced pieces of IoT malware which compromises the system in a three-stage attack.

The first stage consists of a payload that can achieve boot persistence on devices which can also survive the reboot from routers. The second stage follows by the injection of a Remote Access Token (RAT) and for the third stage, the hackers use this RAT software to add malicious functionality to the router.

A report from Estonian Foreign Intelligence Service claimed that APT28 is a unit of Russian Military Main Intelligence Directorate (GRU) which is behind many cyber attacks on the past such as NotPetya ransomware and BlackEnergy attacks. The Ukrainian officials need to strong to survive the attack from the malware again as it has risen from the ashes.

Take your time to comment on this article.

authorarticle: Master3395
linksys-wifi-router-hacking-tool.png
video: 
youtube: 
sources: latesthackingnews.com
keywords: attack, Ukrainian Routers, VPN Filter

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 575  >  >>

This is how Microsoft will bring the Xbox to the TV, without the Xbox

Microsoft.webp

Oct 27, 2020 | Category: Microsoft | Comments

xCloud directly in the HDMI port.

read more…

New Windows update setting

Windows.jpg

Oct 26, 2020 | Category: Microsoft | Comments

Looking to install a specific feature release of Windows 10 when you want it? Here's how.

read more…

Microsoft launches its second update rerun, Windows 10 20H2

Windows.jpg

Oct 25, 2020 | Category: Microsoft | Comments

The Windows 10 October 2020 Update is now available, which means enterprise users can begin testing it before embarking on a broader deployment.

read more…

Page 1 of 575  >  >>