When the malware called VPNFilter was first made known to the public, ensuing announcements from security researchers and even the Federal Bureau of Investigation suggested that its effects had been contained following a shutdown of a domain linked to the malware's operations. Unfortunately, Cisco Talos recently learned that this is not completely the case.
Cisco Talos was the first to discover the spread of VPNFilter and that it targets Wi-Fi routers. The malware was initially thought to have the capacity to only destroy routers. However, new findings suggest that it also has the ability to steal people’s information by bypassing web encryptions.
In Cisco’s first report, it admitted that the information it had was just preliminary and that the study on VPNFilter may still develop. And so it did.
Cisco’s latest report said it discovered a new multi-stage module “that injects malicious content into web traffic as it passes through a network device.” This means that the attackers can put a malicious code on a victim’s network traffic without triggering an alert that would notify if his or her computer has been compromised.
“With this new finding, we can confirm that the threat goes beyond what the actor could do on the network device itself, and extends the threat into the networks that a compromised network device supports,” the researchers further explained.
The VPNFilter malware, it was learned, was designed to also bypass the SSL encryption commonly used on the web.
SSL, or Secure Socket Layers, ensures that all information that is passing through the network — from web servers to people’s browsers — will not leak and will remain secure. Unfortunately, traces were reportedly found that VPNFilter can work its way around this encryption, too.
In addition to the very scary effects of VPNFilter infection, security researchers also learned that Wi-Fi devices from more manufacturers have also been targeted by the malware. Cisco recently confirmed that routers from ASUS, D-Link, Huawei, Ubiquiti, UPVEL and ZTE are affected too.
Previously, routers made by Linksys, MikroTik, Netgear and TP-Link were found targeted by the VPNFilter actors.
Meanwhile, similar to Cisco’s initial findings, Symantec also concluded that the VPNFilter actors are specifically targeting computers and networks based in Ukraine, although infected machines were found in at least 54 countries. For this reason, researchers and authorities believe that this is a massive state-sponsored attack.


Tencent Shares Slide After WeChat Restricts YuanBao AI Promotional Links
SoftBank and Intel Partner to Develop Next-Generation Memory Chips for AI Data Centers
SpaceX Reports $8 Billion Profit as IPO Plans and Starlink Growth Fuel Valuation Buzz
Amazon Stock Rebounds After Earnings as $200B Capex Plan Sparks AI Spending Debate
Nvidia Confirms Major OpenAI Investment Amid AI Funding Race
OpenAI Expands Enterprise AI Strategy With Major Hiring Push Ahead of New Business Offering
Alphabet’s Massive AI Spending Surge Signals Confidence in Google’s Growth Engine
Oracle Plans $45–$50 Billion Funding Push in 2026 to Expand Cloud and AI Infrastructure
Elon Musk’s Empire: SpaceX, Tesla, and xAI Merger Talks Spark Investor Debate
Nvidia CEO Jensen Huang Says AI Investment Boom Is Just Beginning as NVDA Shares Surge
Elon Musk’s SpaceX Acquires xAI in Historic Deal Uniting Space and Artificial Intelligence
Global PC Makers Eye Chinese Memory Chip Suppliers Amid Ongoing Supply Crunch
Palantir Stock Jumps After Strong Q4 Earnings Beat and Upbeat 2026 Revenue Forecast
SpaceX Updates Starlink Privacy Policy to Allow AI Training as xAI Merger Talks and IPO Loom
AMD Shares Slide Despite Earnings Beat as Cautious Revenue Outlook Weighs on Stock 



