ASUS

ASUS

Thousands of expired ASUS routers (models like **4G-AC55U, GT-AX11000, RT-AC1300UHP**, etc.) were hijacked by **Chinese state-sponsored actors** into a botnet named **'Operation WrtHug'**, exploiting **n-day vulnerabilities (CVE-2023-41345, CVE-2024-12912, etc.)**. The attackers deployed a **self-signed 100-year TLS certificate** to mask their espionage traffic, turning compromised routers into a **globally distributed relay network** for cyber-espionage. The majority of affected devices were in **Taiwan and Southeast Asia**, aligning with geopolitical targeting interests. The botnet enabled hidden C2 infrastructure, resilient attack staging, and intrusions against high-value targets, posing risks to **national security, critical communications, and geopolitical stability**. No direct financial or customer data breaches were reported, but the campaign facilitated **large-scale covert surveillance and potential future attacks** on strategic entities.

Source: https://www.techradar.com/pro/security/asus-routers-across-the-globe-hit-by-suspected-chinese-cyberattack-heres-what-we-know

ASUS cybersecurity rating report: https://www.rankiteo.com/company/asus

"id": "ASU1192111111925",
"linkid": "asus",
"type": "Cyber Attack",
"date": "6/2023",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'customers_affected': 'thousands (router owners)',
                        'industry': 'consumer electronics/networking',
                        'location': 'Taiwan',
                        'name': 'ASUS',
                        'type': 'technology manufacturer'},
                       {'location': ['Taiwan', 'Southeast Asia'],
                        'name': 'Router owners (individuals/organizations)',
                        'type': ['individuals',
                                 'businesses',
                                 'government entities']}],
 'attack_vector': ['exploitation of n-day vulnerabilities',
                   'end-of-life (EOL) device targeting',
                   'self-signed TLS certificate abuse (100-year validity)'],
 'customer_advisories': ['ASUS likely issued advisories for affected router '
                         'models (4G-AC55U, 4G-AC860U, DSL-AC68U, GT-AC5300, '
                         'GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, '
                         'RT-AC1300UHP)'],
 'data_breach': {'data_encryption': ['self-signed TLS certificate (100-year '
                                     'validity) deployed on routers']},
 'description': 'Thousands of expired ASUS routers are being hijacked and '
                "assimilated into a botnet ('Operation WrtHug') used as "
                'infrastructure for cyber-espionage operations. Chinese '
                'state-sponsored actors exploited multiple n-day '
                'vulnerabilities (CVE-2023-41345, CVE-2023-41346, '
                'CVE-2023-41347, CVE-2023-41348, CVE-2024-12912, '
                'CVE-2025-2492) to deploy a self-signed TLS certificate with a '
                '100-year expiration date. The compromised routers form a '
                'relay network, primarily in Taiwan and Southeast Asia, '
                'enabling espionage traffic routing, origin obfuscation, and '
                'resilient C2 infrastructure for attacks against high-value '
                'geopolitical targets.',
 'impact': {'brand_reputation_impact': ['potential reputational damage to ASUS '
                                        'due to exploited EOL devices'],
            'operational_impact': ['routers repurposed as relay nodes for '
                                   'espionage traffic',
                                   'obfuscation of threat actor origin',
                                   'potential staging for high-value attacks'],
            'systems_affected': ['thousands of ASUS routers']},
 'initial_access_broker': {'backdoors_established': ['self-signed TLS '
                                                     'certificate for '
                                                     'persistent C2'],
                           'entry_point': ['exploited n-day vulnerabilities in '
                                           'ASUS routers'],
                           'high_value_targets': ['geopolitical entities in '
                                                  'Taiwan/Southeast Asia']},
 'investigation_status': 'ongoing (disclosed by SecurityScorecard/ASUS)',
 'lessons_learned': ['End-of-life (EOL) devices pose significant risks if left '
                     'unpatched or in use.',
                     'State-sponsored actors leverage n-day vulnerabilities in '
                     'legacy systems for espionage infrastructure.',
                     'Long-lived certificates (e.g., 100-year TLS) can serve '
                     'as indicators of sophisticated, persistent campaigns.',
                     'Geopolitical alignment of compromised assets (e.g., '
                     'Taiwan/Southeast Asia) highlights strategic targeting.'],
 'motivation': ['cyber-espionage',
                'geopolitical targeting',
                'resilient C2 infrastructure'],
 'post_incident_analysis': {'root_causes': ['Use of EOL routers with unpatched '
                                            'n-day vulnerabilities',
                                            'Lack of automatic updates or user '
                                            'patching for legacy devices',
                                            'Abuse of trusted firmware '
                                            '(AsusWRT) for malicious '
                                            'purposes']},
 'recommendations': ['Replace or decommission EOL networking devices to '
                     'eliminate attack surfaces.',
                     'Monitor for unusual certificate lifetimes (e.g., '
                     '100-year TLS) as potential IoCs.',
                     'Implement network segmentation to limit lateral movement '
                     'via compromised routers.',
                     'Enhance detection for ORB (Operational Relay Box)-like '
                     'traffic patterns.',
                     'Public-private collaboration for threat intelligence '
                     'sharing (e.g., ASUS-SecurityScorecard model).'],
 'references': [{'source': 'TechRadar'},
                {'source': 'SecurityScorecard & ASUS joint report'}],
 'response': {'communication_strategy': ['public disclosure via '
                                         'SecurityScorecard/ASUS report',
                                         'media coverage (e.g., TechRadar)'],
              'incident_response_plan_activated': ['collaboration between '
                                                   'SecurityScorecard and '
                                                   'ASUS'],
              'third_party_assistance': ['SecurityScorecard']},
 'threat_actor': ['Chinese state-sponsored actors'],
 'title': 'Operation WrtHug: Thousands of expired ASUS routers hijacked into '
          'cyber-espionage botnet',
 'type': ['botnet', 'cyber-espionage', 'supply chain compromise'],
 'vulnerability_exploited': ['CVE-2023-41345',
                             'CVE-2023-41346',
                             'CVE-2023-41347',
                             'CVE-2023-41348',
                             'CVE-2024-12912',
                             'CVE-2025-2492']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.