Mass Compromise of Asus Routers: An Alarming Security Breach
Recent findings reveal that thousands of Asus routers have fallen victim to a hacking spree orchestrated by a suspected Chinese state-sponsored group. These routers, primarily targeting seven specific models that are no longer supported by Asus, now face significant security vulnerabilities, as they no longer receive essential updates or security patches.
Security researchers from SecurityScorecard have dubbed this operation “WrtHug.” Although the full intentions of the attackers remain unclear, the implications of such a widespread compromise are worrying. Notably, the routers affected are devices that consumers may still be using, unaware of their potential security risks.
Potential Use of Compromised Devices
According to SecurityScorecard, the compromised Asus routers might be functioning similarly to operational relay box (ORB) networks, commonly used in espionage. These networks can obscure the identity of the hackers, making it more challenging for authorities to trace their activities.
“Having this level of access may enable the threat actor to use any compromised router as they see fit,” the researchers warned. “Our experience with ORB networks suggests compromised devices will commonly be used for covert operations and espionage, rather than more overt malicious activities like DDoS attacks.”
The geographical distribution of the compromised devices shows a concentration in Taiwan, with smaller clusters identified in South Korea, Japan, Hong Kong, Russia, Central Europe, and the United States. This wide spread emphasizes the global nature of the threat.
A heat map of infected devices.
Historical Context of State-Sponsored Hacking
The rise of ORB networks has been closely monitored, especially concerning Chinese government activities. Notably, in 2021, the French government alerted national organizations of attacks attributed to APT31, one of China’s prominent threat groups, using compromised routers for surveillance. This trend appears to continue, with at least three similar campaigns attributed to state-sponsored actors from China emerging last year.
Similarly, Russian state-backed hackers have employed tactics involving router compromises, albeit less frequently. In 2018, a sophisticated malware known as VPNFilter infiltrated over 500,000 small office and home routers. Evidently, the 2024 network hacks revealed further involvement from Russian government groups.
As the global cybersecurity landscape continues to evolve, understanding the implications of such attacks becomes increasingly vital for both consumers and organizations. Strengthening cybersecurity measures and remaining vigilant against potential threats should be a priority for everyone.
For additional information, you can read the full article Here.
Image Credit: arstechnica.com






