VPNFilter

VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. [1] [2] VPNFilter was assessed to be replaced by Sandworm Team with Cyclops Blink starting in 2019.[3]

ID: S1010
Type: MALWARE
Platforms: Network, Linux
Version: 2.0
Created: 26 March 2019
Last Modified: 15 August 2024

Techniques Used

Domain ID Name Use
Enterprise T1561 .001 Disk Wipe: Disk Content Wipe

VPNFilter has the capability to wipe a portion of an infected device's firmware.[4]

ICS T0830 Adversary-in-the-Middle

The VPNFilter's ssler module configures the device's iptables to redirect all traffic destined for port 80 to its local service listening on port 8888. Any outgoing web requests on port 80 are now intercepted by ssler and can be inspected by the ps module and manipulated before being sent to the legitimate HTTP service. [1] [2]

ICS T0842 Network Sniffing

The VPNFilter packet sniffer looks for basic authentication as well as monitors ICS traffic, and is specific to the TP-LINK R600-VPN. The malware uses a raw socket to look for connections to a pre-specified IP address, only looking at TCP packets that are 150 bytes or larger. Packets that are not on port 502, are scanned for BasicAuth, and that information is logged. This may have allowed credential harvesting from communications between devices accessing a modbus-enabled HMI. [1] [2]

Groups That Use This Software

ID Name References
G0034 Sandworm Team

VPNFilter is associated with Sandworm Team operations based on reporting on VPNFilter replacement software, Cyclops Blink.[3]

References