A Report on the VPNFilter W.O.R.M.
According to the FBI and CISCO Talos Group, the malware affects certain routers in stages.
This software installs itself in multiple stages:
- Stage 1 involves a worm which adds code to the device’s crontab (the list of tasks run at regular intervals by the cron scheduler on Linux). This allows it to remain on the device after a reboot, and to re-infect it with the subsequent stages if they are removed. Stage 1 uses known URLs to find and install Stage 2 malware. If those known URLs are disabled, Stage 1 sets up a socket listener on the device and waits to be contacted by command and control systems.
- Stage 2 is the body of the malware, including the basic code that carries out all normal functions and executes any instructions requested by special, optional Stage 3 modules.
- Stage 3 can be any of various “modules” that tell the malware to do specific things, like spying on industrial control devices (Modbus SCADA) or using anonymity network Tor protocol to communicate over encrypted traffic channels.
My issue was that the FBI sank those sites that the WORM relied on, so the signal kept sending requests to download to them with no answer. This eventually made my network useless on the 2.4GHz radio band.
Normally a router factory reset would get rid of Stage 2 and Stage 3, however, since it initially embeds itself into the firmware on Stage 1, there is no way to fully get rid of it. From my own experience, the VPNFilter WORM will attach itself to the crontrab (the router’s listen socket on/off schedular) and randomly set a scheduled listening time each time you do a factory reset.
Below is the Wikipedia article and a list of devicese affected by a vulnerability that allows the VPNFilter WORM to install itself.
https://en.wikipedia.org/wiki/VPNFilter#Devices_at_risk
Asus:
RT-AC66U
RT-N10
RT-N10E
RT-N10U
RT-N56U
RT-N66U
D-Link:
DES-1210-08P
DIR-300
DIR-300A
DSR-250N
DSR-500N
DSR-1000
DSR-1000N
Huawei:
HG8245
Linksys:
E1200
E2500
E3000
E3200
E4200
RV082
WRVS4400N
Mikrotik:
CCR1009
CCR1016
CCR1036
CCR1072
CRS109
CRS112
CRS125
RB411
RB450
RB750
RB911
RB921
RB941
RB951
RB952
RB960
RB962
RB1100
RB1200
RB2011
RB3011
RB Groove
RB Omnitik
STX5
Mikrotik RouterOS versions up to 6.38.5 on current or 6.37.5 on bug-fix release chains.
Netgear:
DG834
DGN1000
DGN2200
DGN3500
FVS318N
MBRN3000
R6400
R7000
R8000
WNR1000
WNR2000
WNR2200
WNR4000
WNDR3700
WNDR4000
WNDR4300
WNDR4300-TN
UTM50
QNAP:
TS251
TS439 Pro
Other QNAP NAS devices running QTS software
TP-Link
R600VPN
TL-WR741ND
TL-WR841N
Ubiquiti:
NSM2
PBE M5
Upvel:
Unknown Models [nb 1]
ZTE:
ZXHN H108N
Epidemiology
VPNFilter is described by Cisco Talos as having infected as many as 500,000 devices worldwide, in perhaps 54 different countries, though proportionately the focus has been on Ukraine.
That being said, I strongly urge that people upgrade to a new device, or replace their current router, with one that is not listed above.
]]>