Security Experts:

Connect with us

Hi, what are you looking for?



New ‘Cyclops Blink’ Malware Linked to Russian State Hackers Targets Firewalls

Russia-Linked Sandworm Group Replaces VPNFilter With New Malware

Russia-Linked Sandworm Group Replaces VPNFilter With New Malware

Following the 2018 public exposure of the VPNFilter malware, the Russia-linked Sandworm threat group has developed a replacement malware framework, which has mainly targeted firewall appliances, government agencies in the United States and the United Kingdom warn.

Also referred to as APT28, Fancy Bear, Sednit, Sofacy, and Voodoo Bear, the Sandworm hacking group is believed to be part of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).

Historically, Sandworm has engaged in numerous cyberattacks targeting Ukraine, such as the 2015 BlackEnergy and the 2016 Industroyer attacks, as well as incidents with a broader impact, such as the 2017 NotPetya operation, and the 2018 attacks on the Winter Olympics and Paralympics.

In 2018, the United States announced that it had disrupted the “VPNFilter” botnet, but shortly after, the Security Service of Ukraine (SBU) said the Aulska chlorine station in Auly, Dnipropetrovsk, was targeted with the VPNFilter malware, likely in an attempt to disrupt operations at the critical infrastructure plant.

[READ: Hundreds of Networks Still Host Devices Infected With VPNFilter Malware]

In January last year, Trend Micro discovered that hundreds of networks worldwide still contained devices vulnerable to VPNFilter, such as network-attached storage (NAS) devices and small office/home office (SOHO) routers. Thousands of products were likely still infected.

In a joint advisory on Wednesday, the United Kingdom’s National Cyber Security Centre (NCSC) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) revealed that Sandworm has replaced VPNFilter with a new malware framework, called Cyclops Blink.

Likely active since 2019, Cyclops Blink has been used in attacks without discrimination, mainly deployed on WatchGuard firewall appliances. The observed samples were developed for PowerPC (big-endian) architecture, but the four agencies believe that Sandworm is capable of compiling the malware for other architectures and firmware as well.

“The malware itself is sophisticated and modular with basic core functionality to beacon device information back to a server and enable files to be downloaded and executed. There is also functionality to add new modules while the malware is running, which allows Sandworm to implement additional capability as required,” the joint advisory reads.

[READ: More Russian Attacks Against Ukraine Come to Light]

Cyclops Blink is typically deployed post exploitation as part of a firmware ‘update’ and achieves persistence at device reboot, which makes remediation more difficult. Delivered as a malicious Linux ELF executable and featuring a modular design, the malware’s capabilities can be expanded while it is running.

Cyclops Blink is loaded into memory as two program segments, one with read/execute permissions and another with read/write permissions. The first contains the Linux ELF header and executable code, while the second contains the data used by the malware, NCSC explains in a separate technical report.

The malware’s modular framework consists of a core component and modules that run as child processes. Several modules – responsible for file downloads/uploads, device information gathering, and malware updates – are built-in and executed at launch.

According to NCSC, Cyclops Blink’s developers likely reverse-engineered the WatchGuard Firebox firmware update process to identify vulnerabilities in the process and exploit them. WatchGuard has worked closely with the FBI, CISA and the NCSC to deliver the resources necessary for removing the malware from infected devices.

WatchGuard estimates that roughly 1% of active firewall appliances – which are mainly used by business customers – are impacted.

“Only those appliances that had been configured to have management open to the Internet are vulnerable to Cyclops Blink,” the company said. “Firewall appliances are not at risk if they were never configured to allow unrestricted management access from the Internet. Restricted management access is the default setting for all WatchGuard’s physical firewall appliances. No other WatchGuard products are impacted.”

Related: Sandworm Hackers Hit French Monitoring Software Vendor Centreon

Related: FBI Attribution of ‘VPNFilter’ Attack Raises Questions

Related: Russian Hackers Use New ‘SkinnyBoy’ Malware in Attacks on Military, Government Orgs

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.