logo

VPN Filter

   

Added on  2023-01-18

4 Pages604 Words39 Views
 | 
 | 
 | 
Running head: VPN FILTER
VPN FILTER
Name of the Student
Name of the University
Author Note
VPN Filter_1

1VPN FILTER
This video explains about the VPN filter. VPN filter is basically a malware that is
designed for infecting the routers and certain network attached storage device. According to
the survey in the year 2018 there were 500,000 routers from all over the world were facing
the risk. The VPN filter has an ability to impact a huge number of different kinds of network
and storage devices. The video has described all the major attacks that has taken place with
the use of VPN filter. This uses multiple third stage operations as soon as the initial infection
takes place. Apart from this there is another function performed by VPN filter that includes
sniffing the data stored within the connected network. The data extracted from a network are
then encrypted and exfiltrated with the use of Tor network. This are mainly designed for
infecting routers when attacked with network storage devices. This video has explained the
way data gets stolen from routers and includes a kill witch commands that are used for
rebooting the router. There are certain router that are being affected by these VPN filter are
ASUS, D-Link, Liksys, TP-link and many more. Basically VPN filter gets attached with
router in a way so that it can add malicious content towards traffic and has the ability affect
routers. With time it is being observed that VPN filter has developed a malware that has the
ability to steal passwords and other information stored within the system. The main working
of VPN filter is to create a sysopt connection that will permit VPN commands for allowing
the traffic to enter within the security. This enters allows VPN tunnel to act as a bypass.
Apart from all VPN- filter is also being applied to postdecrypted traffic after it gets into the
tunnel and preencrypted traffic before it enters. Thus, the video will help to describe the
major effects that are created on router by VPN filter. The major stages that are associated
with the VPN filter are divided into three stages. Stage 1 includes worm that adds code to
devices. Second stage includes detecting the body of malware and stage three includes
specific things for controlling the devices. Once the worm gets installed with the use of VPN
Filter they gets the power to attack the devices that are running embedded within this
VPN Filter_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Infrastructure Component 2022 Report
|10
|2182
|17

Risks, Threats, and Vulnerabilities in Bank IT Infrastructure
|3
|803
|366

Introduction to Cyber Crime Week 5
|6
|843
|323

Hardware and Networks for MATTAC
|8
|2064
|248

Ensuring Data Security in Cloud Computing Environments
|9
|2109
|168

Assignment on Cyber Security 2022
|7
|712
|26