A silent operation has compromised thousands of ASUS routers. Investigators target groups linked to China

Few devices are as stable and discreet as the router. We barely think about them, we rarely review their configuration, and we rarely consider them part of the security debate. They are just there, connecting. This condition makes them ideal terrain for those seeking to go unnoticed. A recent investigation has revealed that ASUS routers are being used as part of a remote operating structure. They don’t cause problems, but they are no longer just an internet access point. According to SecurityScorecardthe signal reveals the existence of something more than a specific failure. The researchers observed that a significant volume of ASUS routers exhibited the same TLS certificatewith a validity of one hundred years, which does not fall within the usual parameters of this type of equipment. This coincidence made it possible to identify a structured campaign, called WrtHug, and conclude that the devices had been altered in a coordinated manner to remain connected and operational without alerting their owners. How WrtHug works. According to the analysis, the campaign is based on vulnerabilities present in ASUS routers and in the service AICloudwhich allows remote access to files and connected devices from outside the home network. By leveraging that channel, attackers can execute system-level commands and modify settings without requiring user intervention. The presence of the shared TLS certificate acts as a sign of this alteration and shows how the routers become part of an intermediary infrastructure, useful to hide the real origin of the activity. AiCloud is a function integrated into ASUS routers that allows you to access files stored on USB drives connected to the router or in shared folders on a computer from outside the home. It can be used from a browser or through a mobile application, making it easy to view documents, photos or videos without being physically on the local network. That legitimate remote connection capability, intended for convenience, also means that any alteration to the system has broader consequences if an external actor comes to control it. Which models are at risk. SecurityScorecard identifies several affected ASUS models, many of them old or end-of-life. Among those registered are: 4G-AC55U 4G-AC860U DSL-AC68U GT-AC5300 GT-AX11000 RT-AC1200HP RT-AC1300GPLUS RT-AC1300UHP Some are still used in homes, but others are installed in small offices or businesses that have never renewed the equipment. It should be noted that although ASUS has published security patches and the vulnerabilities are officially corrected, research indicates that the majority of compromised devices are EoL (end of life) or outdated models. This combination of lack of support and obsolete equipment multiplies the risk that the problem persists over time. Where the operation has been detected. The researchers observed that the compromised routers are concentrated in Asia-Pacific, with an especially high presence in Taiwan and other countries in the region such as South Korea, Japan and Hong Kong. Active devices were also registered in Russia, the United States and several Central European countries. A map with the concentration of infected devices | Image: A notable element of the report is that no cases were identified in mainland China, which analysts interpret as a contextual clue, although not proof of authorship. The geographical scope confirms that this is not a local phenomenon, but rather a distributed infrastructure. What researchers say about China. SecurityScorecard does not definitively attribute the campaign, but notes that the behavior observed on the routers coincides with tactics previously used by actors associated with China. Researchers speak of “low-moderate confidence” that WrtHug is an ORB facilitation campaign operated by a pro-China actor, that is, a network of compromised devices that act as intermediate nodes to conceal the real origin of future operations. Among the technical parallels, analysts highlight similarities with a campaign called AyySSHush and the use of vulnerability CVE-2023-39780. What to do if I have an ASUS router. Detecting if a device is compromised is not easy, because the changes introduced by WrtHug do not affect its operation. The first thing is to check if the model is among those that have stopped receiving support and install, if it exists, the latest version of firmware available from the ASUS website, following the recommendations of its security notices. As additional measures, it is advisable to disable remote services that are not used, such as AiCloud, review possible unauthorized access and consider replacing the equipment if it is already at the end of its life. WrtHug shows that home routers are no longer a neutral element. They are devices always on, connected and with sufficient capacity to sustain discrete operations without altering their operation. This combination makes them useful pieces within a digital dashboard that previously seemed reserved for more complex systems. Images | ASUS | SecurityScorecard In Xataka | Correos and the DGT are already widely seen, so the scammers have changed their objective: an app to pay for parking

Thousands of ASUS routers have been committed to an intrusion campaign: restart them does not eliminate the threat

A new intrusion campaign has put several models of ASUS routers. According to GraynoiseSpecialized in cybersecurity, at least three different devices would be exploited by an actor “highly trained and with sufficient resources.” Sophisticated threats are usually aimed at very specific objectives, but this campaign has a broader pattern. Researchers have already detected about 9,000 committed devices, and ensure that the number continues to increase. It is believed that the foundations could be laying for a future botnet, Key piece for DDOS attacks. Persistent access without malware The attackers get initial access through brute force techniques And the use of evasion strategies that still do not have an identifier Cve. In cybersecurity, a CVE (acronym for common vulnerabilities and exposures) is a standard reference that is used to catalog known vulnerabilities publicly. {“Videid”: “X801AZU”, “Autoplay”: False, “Title”: “How to protect your Android from viruses and malware: tricks and advice”, “tag”: “”, “duration”: “271”} After that first step, cybercriminals take advantage of a specific vulnerability already documented, identified as CVE-2023-39780to execute arbitrary commands and modify the router configuration from within. The objective is not to install a traditional spy virus or software, but something more subtle: open a remote rear door. To do this, they enable SSH access in a specific port (TCP/53282) and insert their own public key into the NVRAM memory, a type of internal storage that It is not erased by restarting the router nor when updating your firmware. In this way, the attacker’s access persists in time, without leaving obvious signs. The researchers have replicated the attack on several specific models, including the ASUS RT-AC3100, RT-AC3200 and RT-AX55. It is not an official list of committed devices, but a clue to which they could be in the spotlight. At the moment, it is not ruled out that there are other models also exposed. Greynoise has not officially attributed the campaign to any specific group. However, he points out that the techniques used (the use of legitimate functions of the system, the deactivation of the activity records and the absence of visible malware) are usual characteristics of Very elaborate attacks and long -term planned. These types of operations are usually linked to the calls APTacronym in English of Advanced Persistant Threat. These are cyber -cyber -acting groups that act with advanced technical means, great discretion and very defined objectives, often related to strategic or governmental interests. The finding occurred the past March 18thanks to SIFTan analysis tool developed by Greynoise. The publication of the details It was intentionally delayed to facilitate coordination with public agencies and companies in the sector before making it public. How to know if your router has been committed Asus has corrected vulnerability CVE-2023-39780 In a recent firmware update. However, if the device was compromised before applying that patch, remote access can remain active. Greynoise offers a series of steps that can help detect whether a router has been affected, although it is true that some of them They can be complex for those who are not familiar with technical concepts or do not handle with ease in the advanced device configuration. Even so, it is convenient to meet them: Access the configuration of your router and verify if the access by SSH is enabled in the TCP/53282 port. Check the file called Authorized_Keyssince it could contain an unauthorized public key. Block these IP addresses, associated with the campaign: 101.99.91.151, 101.99.94.173, 79.141.163.179 and 111.90.146.237. If you suspect that your device is affected, perform a complete factory restoration and configure it manually. In Xataka Openai has just demonstrated that the AI ​​no longer completely obeys: O3 sabote its own shutdown to continue working The scale of the attack and its ability to stay hidden reinforce a key lesson: the safety of domestic routers should not be taken for granted. Although in this case malware has not been installed, the attackers They have left an open door. We have contacted Asus to request comments on this campaign and know if they plan to offer new additional measures or recommendations. This article will be updated if we receive an official response for its part. Images | Freepik | Asus In Xataka | Alcasec is not any youth hacker: he set up a Spanish criminal infrastructure that even had customer service bot (Function () {Window._js_modules = Window._js_modules || {}; var headelement = document.getelegsbytagname (‘head’) (0); if (_js_modules.instagram) {var instagramscript = Document.Createlement (‘script’); }}) (); – The news Thousands of ASUS routers have been committed to an intrusion campaign: restart them does not eliminate the threat It was originally posted in Xataka by Javier Marquez .

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.