Cisco Blogs
Share

VPNFilter Update – VPNFilter exploits endpoints, targets new devices

- June 6, 2018 - 1 Comment

Introduction

Cisco Talos, while working with our various intelligence partners, has discovered additional details regarding “VPNFilter.” In the days since we first published our findings on the campaign, we have seen that VPNFilter is targeting more makes/models of devices than initially thought, and has additional capabilities, including the ability to deliver exploits to endpoints. Talos recently published a blog about a broad campaign that delivered VPNFilter to small home-office network devices, as well as network-attached storage devices. As we stated in that post, our research into this threat was, and is, ongoing. In the wake of that post, we have had a number of partners step forward with additional information that has assisted us in our work. This post is an update of our findings over the past week.

Read more here.

Tags:
Leave a comment

We'd love to hear from you! To earn points and badges for participating in the conversation, join Cisco Social Rewards. Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed and HTML formatting will not appear.

1 Comments

  1. I have a linksis E3000 router which I read is possibly vulnerable to VPNFilter......ssler malware. How can I determine if it is aready loaded on my system? Is their a repair protcol or procedure to clean, or a patch? wallace.daniel@comcast.net