Notification

Icon
Error

Discover VPNFilter malware vulnerable devices

Posted: Thursday, May 24, 2018 4:33:48 PM(UTC)
Esben.D

Esben.D

Member Administration Original PosterPosts: 1,982
0
Like
Due to the recent discovery of the new VPNFilter malware, we created a report to discover potential vulnerable devices.

The VPNFilter malware allows attackers to gather information and even disable equipment. To do this, VPNFilter uses a 3 stage platform.
Stage 1 serves as a deployment platform for stage 2 and 3.
Stage 2 allows for file collection, command execution, data exfiltration and device management.
Stage 3 adds additional capabilities to stage 2 like packet sniffing.
For more detailed technical information, you head over to this blog post.

Stage 2 and 3 can be removed by simply rebooting affected devices. Since stage 1 can still redeploy stage 2 and 3, we recommend installing the latest firmware on the vulnerable assets when the manufacturer has released a firmware update to fix the vulnerability.

Based on the information from multiple sources, routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices are vulnerable to this malware.
Based on information from Symantec, vulnerable models include, but are not limited to:
  • Linksys E1200
  • Linksys E2500
  • Linksys WRVS4400N
  • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
  • Netgear DGN2200
  • Netgear R6400
  • Netgear R7000
  • Netgear R8000
  • Netgear WNR1000
  • Netgear WNR2000
  • QNAP TS251
  • QNAP TS439 Pro
  • Other QNAP NAS devices running QTS software
  • TP-Link R600VPN
To find possible vulnerable devices in your network. You can run the report below to get an overview of all routers and NAS devices of the known affected manufacturers. We recommend rebooting the devices and updating to the latest firmware version.
Instructions on how to run this report in Lansweeper can be found here.

Code:
Select Top 1000000 tblAssets.AssetID,
  tblAssets.AssetName,
  tblAssets.Description,
  tblAssets.IPAddress,
  tsysIPLocations.IPLocation,
  tblAssetCustom.Manufacturer,
  tblAssetCustom.Model,
  tblAssets.Lastseen,
  tblAssets.Lasttried
From tblAssets
  Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID
  Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype
  Inner Join tsysIPLocations On tsysIPLocations.LocationID =
    tblAssets.LocationID
  Inner Join tblState On tblState.State = tblAssetCustom.State
Where (tblAssetCustom.Manufacturer In ('Linksys', 'Mikrotik', 'Netgear',
  'TP-Link') And tsysAssetTypes.AssetTypename = 'Router') Or
  (tblAssetCustom.Manufacturer Like '%QNAP%' And tsysAssetTypes.AssetTypename =
  'NAS')
Order By tblAssets.AssetName
Esben.D
#1Esben.D Member Administration Original PosterPosts: 1,982  
posted: 5/24/2018 4:36:00 PM(UTC)
Feel free to discuss this topic in the related Reports forum topic.

Active Discussions

Lansweeper Driver vendor
by  miharix   Go to last post Go to first unread
Last post: Today at 3:04:54 PM(UTC)
Lansweeper SSH Scanning Credentials
by  BastiOn  
Go to last post Go to first unread
Last post: Today at 9:22:46 AM(UTC)
Lansweeper lansweeperuser sql database permissions
by  FrankSc   Go to last post Go to first unread
Last post: Today at 8:54:22 AM(UTC)
Lansweeper Software not showing install date
by  Rocher Vincent  
Go to last post Go to first unread
Last post: Today at 8:18:30 AM(UTC)
Lansweeper LSAgent Rescan Asset
by  marck1024   Go to last post Go to first unread
Last post: Yesterday at 6:46:48 PM(UTC)
Lansweeper Windows 10 20H2 issue
by  Mikey!  
Go to last post Go to first unread
Last post: Yesterday at 2:49:26 PM(UTC)
Lansweeper Use case for MSSP
by  CHTSjohn   Go to last post Go to first unread
Last post: 3/1/2021 10:49:11 PM(UTC)