Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
WrtHug Exploits Six ASUS Flaws to Hijack Tens of Thousands of EoL Routers
Advertisements

A widespread campaign attributed to a threat actor dubbed WrtHug has successfully hijacked tens of thousands of ASUS routers across the globe. The attack specifically targets devices that have reached their End-of-Life (EoL) status, meaning they no longer receive security updates from the manufacturer.

The operation leverages a combination of six known security vulnerabilities present in the ASUSWRT firmware that powers the affected router models. By exploiting these flaws, WrtHug gains control over the vulnerable internet-facing devices.

Attack Methodology and Exploited Flaws

The WrtHug campaign is distinguished by its method of chaining six distinct vulnerabilities to achieve its objective. This multi-pronged approach allows the attackers to compromise a wide range of unpatched ASUS routers. The targeted devices are all running older versions of the ASUSWRT firmware where these security holes have not been patched. The primary targets are routers that are no longer supported by ASUS, leaving them permanently exposed to such attacks without any available recourse for official security fixes.

Global Impact on End-of-Life Hardware

The scale of the campaign is global, with reports indicating that tens of thousands of routers have been compromised worldwide. The focus on EoL hardware highlights a significant risk in the consumer networking space. Once a manufacturer ceases support for a device, it stops receiving firmware updates that patch security vulnerabilities. The WrtHug campaign demonstrates how threat actors actively seek out and exploit these legacy devices, which often remain in operation on networks for years after their official support period has ended.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading