Thousands of ASUS routers are being hijacked in a state-sponsored cyber espionage campaign
Researchers believe that Operation WrtHug is being carried out by Chinese state-sponsored hackers
Thousands of ASUS routers around the world have been hijacked in a sophisticated campaign believed to be backed by China.
According to SecurityScorecard’s Strike threat intelligence team, the WrtHug campaign leverages the proprietary AiCloud service with Nth day vulnerabilities in order to gain high privileges on end-of-life ASUS WRT routers.
The pattern of attacks and the severity of the vulnerabilities indicate potential command injection capabilities, if not root-level privileges, researchers warned.
Your easiest cybersecurity win this year.
Protect your networks with NordLayer and save 28% using the code BLACKLAYER-28.
“Operation WrtHug is a case study in how nation-state actors are embedding themselves in consumer infrastructure to build stealthy, resilient, global espionage networks,” said Gilad Maizles, security researcher at SecurityScorecard.
“The deliberate targeting of end-of-life ASUS devices by compromising proprietary applications and services such as AiCloud, reflect growing strategic interest in SOHO devices. This shows us the willingness of threat actors to specialize in targeting them as reliable staging points.”
The campaign currently appears to be affecting around 50,000 compromised devices around the world, particularly in Taiwan, the US, and Russia, with more victims in some other Southeast Asian and European countries.
All the hijacked routers share a unique, self-signed TLS certificate with a 100-year expiration date - unusually long, researchers noted, and a critical indicator of compromise that points to a level of coordination reflecting careful and calculated espionage.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It was this certificate that first alerted the team to the campaign.
Six flaws underpin the ASUS espionage campaign
The attackers have been leveraging six distinct vulnerabilities for the campaign.
CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, and CVE-2023-41348, all nearly two years old, enable attackers to perform direct OS command injection on ASUS WRT devices using insufficient filtering related to token modules. They're associated with the command injection vulnerability CVE-2023-39780.
Meanwhile, CVE-2024-12912 is an arbitrary command execution vulnerability and CVE-2025-2492 is an improper authentication control vulnerability that can lead to unauthorized function execution via a crafted request.
All are known and have officially been patched - which is why it's mostly end-of-life devices being targeted.
According to researchers, the targeted devices, methods, and timing mirror previous intrusion campaigns that have been linked to China - the LapDogs ORB, for example, recently uncovered by the Strike team.
Some of the vulnerabilities are tied to another ongoing suspected China-linked ORB operation known as AyySSHush, reported to be targeting ASUS devices earlier this year.
The team said it spotted seven IPs with signs of compromise in both Operation WrtHug and AyySSHush, suggesting either a single, evolving campaign or coordination between the two groups.
"These campaigns have demonstrated a clear evolution in attacker methodology. Persistent, resourced hackers are moving beyond simple brute-force attacks to multi-stage infections that exploit a variety of vulnerabilities," said the team.
"By chaining command injections and authentication bypasses, threat actors have managed to deploy persistent backdoors via SSH, often abusing legitimate router features to ensure their presence survives reboots or firmware updates."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
NHS supplier DXS International confirms cyber attack – here’s what we know so farNews The NHS supplier says front-line clinical services are unaffected
-
LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users – here’s how the incident unfoldedNews The impact of the LastPass breach was felt by customers as late as December 2024
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teamsNews A new ISC2 survey indicates that both layoffs and budget cuts are on the decline
-
NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to knowNews Many organizations see prompt injection as just another version of SQL injection - but this is a mistake
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals — and teams at Amazon are already seeing huge gainsNews AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals, and the company has already unlocked significant benefits from the technology internally.



