When the malware called VPNFilter was first made known to the public, ensuing announcements from security researchers and even the Federal Bureau of Investigation suggested that its effects had been contained following a shutdown of a domain linked to the malware's operations. Unfortunately, Cisco Talos recently learned that this is not completely the case.
Cisco Talos was the first to discover the spread of VPNFilter and that it targets Wi-Fi routers. The malware was initially thought to have the capacity to only destroy routers. However, new findings suggest that it also has the ability to steal people’s information by bypassing web encryptions.
In Cisco’s first report, it admitted that the information it had was just preliminary and that the study on VPNFilter may still develop. And so it did.
Cisco’s latest report said it discovered a new multi-stage module “that injects malicious content into web traffic as it passes through a network device.” This means that the attackers can put a malicious code on a victim’s network traffic without triggering an alert that would notify if his or her computer has been compromised.
“With this new finding, we can confirm that the threat goes beyond what the actor could do on the network device itself, and extends the threat into the networks that a compromised network device supports,” the researchers further explained.
The VPNFilter malware, it was learned, was designed to also bypass the SSL encryption commonly used on the web.
SSL, or Secure Socket Layers, ensures that all information that is passing through the network — from web servers to people’s browsers — will not leak and will remain secure. Unfortunately, traces were reportedly found that VPNFilter can work its way around this encryption, too.
In addition to the very scary effects of VPNFilter infection, security researchers also learned that Wi-Fi devices from more manufacturers have also been targeted by the malware. Cisco recently confirmed that routers from ASUS, D-Link, Huawei, Ubiquiti, UPVEL and ZTE are affected too.
Previously, routers made by Linksys, MikroTik, Netgear and TP-Link were found targeted by the VPNFilter actors.
Meanwhile, similar to Cisco’s initial findings, Symantec also concluded that the VPNFilter actors are specifically targeting computers and networks based in Ukraine, although infected machines were found in at least 54 countries. For this reason, researchers and authorities believe that this is a massive state-sponsored attack.


Intel’s Testing of China-Linked Chipmaking Tools Raises U.S. National Security Concerns
Oracle Stock Slides After Blue Owl Exit Report, Company Says Michigan Data Center Talks Remain on Track
OpenAI Explores Massive Funding Round at $750 Billion Valuation
Apple Explores India for iPhone Chip Assembly as Manufacturing Push Accelerates
Nvidia Weighs Expanding H200 AI Chip Production as China Demand Surges
Biren Technology Targets Hong Kong IPO to Raise $300 Million Amid China’s AI Chip Push
Amazon in Talks to Invest $10 Billion in OpenAI as AI Firm Eyes $1 Trillion IPO Valuation
Apple Opens iPhone to Alternative App Stores in Japan Under New Competition Law
Trump Signs Executive Order to Establish National AI Regulation Standard
Australia’s Under-16 Social Media Ban Sparks Global Debate and Early Challenges
Republicans Raise National Security Concerns Over Intel’s Testing of China-Linked Chipmaking Tools
SpaceX Begins IPO Preparations as Wall Street Banks Line Up for Advisory Roles
MetaX IPO Soars as China’s AI Chip Stocks Ignite Investor Frenzy
SK Hynix Considers U.S. ADR Listing to Boost Shareholder Value Amid Rising AI Chip Demand
Trello Outage Disrupts Users as Access Issues Hit Atlassian’s Work Management Platform 



