Thousands of ASUS routers are being hijacked in a state-sponsored cyber espionage campaign
Researchers believe that Operation WrtHug is being carried out by Chinese state-sponsored hackers
Thousands of ASUS routers around the world have been hijacked in a sophisticated campaign believed to be backed by China.
According to SecurityScorecard’s Strike threat intelligence team, the WrtHug campaign leverages the proprietary AiCloud service with Nth day vulnerabilities in order to gain high privileges on end-of-life ASUS WRT routers.
The pattern of attacks and the severity of the vulnerabilities indicate potential command injection capabilities, if not root-level privileges, researchers warned.
Your easiest cybersecurity win this year.
<p><a href="https://go.nordlayer.net/aff_c?offer_id=563&aff_id=3013" target="_blank">Protect your networks with NordLayer and save 28% using the code BLACKLAYER-28.“Operation WrtHug is a case study in how nation-state actors are embedding themselves in consumer infrastructure to build stealthy, resilient, global espionage networks,” said Gilad Maizles, security researcher at SecurityScorecard.
“The deliberate targeting of end-of-life ASUS devices by compromising proprietary applications and services such as AiCloud, reflect growing strategic interest in SOHO devices. This shows us the willingness of threat actors to specialize in targeting them as reliable staging points.”
The campaign currently appears to be affecting around 50,000 compromised devices around the world, particularly in Taiwan, the US, and Russia, with more victims in some other Southeast Asian and European countries.
All the hijacked routers share a unique, self-signed TLS certificate with a 100-year expiration date - unusually long, researchers noted, and a critical indicator of compromise that points to a level of coordination reflecting careful and calculated espionage.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It was this certificate that first alerted the team to the campaign.
Six flaws underpin the ASUS espionage campaign
The attackers have been leveraging six distinct vulnerabilities for the campaign.
CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, and CVE-2023-41348, all nearly two years old, enable attackers to perform direct OS command injection on ASUS WRT devices using insufficient filtering related to token modules. They're associated with the command injection vulnerability CVE-2023-39780.
Meanwhile, CVE-2024-12912 is an arbitrary command execution vulnerability and CVE-2025-2492 is an improper authentication control vulnerability that can lead to unauthorized function execution via a crafted request.
All are known and have officially been patched - which is why it's mostly end-of-life devices being targeted.
According to researchers, the targeted devices, methods, and timing mirror previous intrusion campaigns that have been linked to China - the LapDogs ORB, for example, recently uncovered by the Strike team.
Some of the vulnerabilities are tied to another ongoing suspected China-linked ORB operation known as AyySSHush, reported to be targeting ASUS devices earlier this year.
The team said it spotted seven IPs with signs of compromise in both Operation WrtHug and AyySSHush, suggesting either a single, evolving campaign or coordination between the two groups.
"These campaigns have demonstrated a clear evolution in attacker methodology. Persistent, resourced hackers are moving beyond simple brute-force attacks to multi-stage infections that exploit a variety of vulnerabilities," said the team.
"By chaining command injections and authentication bypasses, threat actors have managed to deploy persistent backdoors via SSH, often abusing legitimate router features to ensure their presence survives reboots or firmware updates."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Entry-level role cutbacks risk huge future talent shortagesNews AI is eating into graduate jobs, and that brings problems for the internal talent pipeline
-
The Cloudflare outage explainedNews Web users globally were met with error messages and site crashes yesterday after an outage at Cloudflare brought much of the web to a standstill – here's what happened.
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Logitech says zero-day attack saw hackers copy 'certain data' from internal IT systemsNews The incident is believed to have formed part of a campaign by the Clop extortion group that targeted customers of Oracle’s E-Business Suite
-
Google wants to take hackers to courtNews You don't have a package waiting for you, it's a scam – and Google is fighting back
-
Laid off Intel engineer accused of stealing 18,000 files on the way outNews Intel wants the files back, so it's filed a lawsuit claiming $250,000 in damages
-
GitHub is awash with leaked AI company secrets – API keys, tokens, and credentials were all found out in the openNews Wiz research suggests AI leaders need to clean up their act when it comes to secrets leaking
-
When cyber professionals go rogue: A former ‘ransomware negotiator’ has been charged amid claims they attacked and extorted businessesNews The attackers are alleged to have demanded ransoms of up to $10 million
-
CISA just published crucial new guidance on keeping Microsoft Exchange servers secureNews With a spate of attacks against Microsoft Exchange in recent years, CISA and the NSA have published crucial new guidance for organizations to shore up defenses.
-
US telco confirms hackers breached systems in stealthy state-backed cyber campaign – and remained undetected for nearly a yearNews The hackers remained undetected in the Ribbon Communications’ systems for months

