Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
10 résultats taggé router  ✕
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign https://censys.com/blog/tracking-ayysshush-a-newly-discovered-asus-router-botnet-campaign
30/05/2025 18:45:04
QRCode
archive.org
thumbnail

Executive Summary:

  • A new, stealthy ASUS router botnet, dubbed AyySSHush, abuses trusted firmware features through a multi-stage attack sequence to backdoor routers and persist across firmware updates, evading traditional detection methods.
  • GreyNoise observed the campaign in March 2025; Censys scan data reveals its global footprint and how it's evolved over the past five months
    4,504 ASUS devices show indicators of compromise as of May 28, 2025, identified by having SSH running on port TCP/53282 — a relatively strong indicator of AyySSHush compromise since this high, nonstandard port is specifically used by the botnet
  • The compromises are globally spread with an APAC concentration: the top affected countries include the U.S., Sweden, Taiwan, Singapore, and Hong Kong.
  • Residential ISPs across Asia, Europe, and the U.S. appear to be the main targeted networks, aligning with the typically observed residential proxy botnet strategy that mimics legitimate users to evade detection.
    Historical trends in compromises observed online reveal a highly dynamic scale of botnet operations that rapidly scaled up and down by 50% in a matter of weeks
  • Attackers leverage ASUS's own built-in configuration tools to inject SSH keys that survive firmware resets -- patching alone isn't enough.
  • Check out our live dashboard tracking exposed ASUS devices with indicators of compromise
    Introduction
    On March 18 2025, researchers at GreyNoise uncovered a sophisticated botnet campaign targeting ASUS routers. Dubbed AyySSHush, the operation exploits legitimate features of ASUS’s AiProtection system to implant persistent SSH backdoors that survive firmware resets. This is an alarming example of threat actors exploiting vendor-sanctioned capabilities to establish a persistent, hard-to-detect presence in consumer-grade hardware.

Censys has been tracking this botnet’s global footprint in partnership with findings from both GreyNoise and Sekoia researchers.

To aid in ongoing tracking and research, we’ve launched a live dashboard that tracks exposed ASUS routers showing indicators of AyySSHush compromise. The data updates daily and provides real-time insight into global trends.

censys EN 2025 ASUS router botnet AyySSHush
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/
05/02/2025 14:25:49
QRCode
archive.org
thumbnail

The Taiwanese hardware maker says it has no plans patch the flaws impacting legacy router models

techcrunch EN 2025 Router Zyxel CVE-2024-40891 CVE-2025-0890
2024-12 Reference Advisory: Session Smart Router: Mirai malware found on systems when the default password remains unchanged https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?
22/12/2024 20:48:48
QRCode
archive.org

n Wednesday, December 11, 2024, several customers reported suspicious behavior on their Session Smart Network (SSN) platforms. These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network. The impacted systems were all using default passwords. Any customer not following recommended best practices and still using default passwords can be considered compromised as the default SSR passwords have been added to the virus database.

juniper EN 2024 advisory SessionSmart Router SSN Mirai default-password
Chinese APT40 hackers hijack SOHO routers to launch attacks https://www.bleepingcomputer.com/news/security/chinese-apt40-hackers-hijack-soho-routers-to-launch-attacks/
10/07/2024 17:40:13
QRCode
archive.org
thumbnail

An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka

bleepingcomputer 2024 EN APT40 Australia China CISA Router Security-Advisory SOHO-Router
Why Your Wi-Fi Router Doubles as an Apple AirTag https://krebsonsecurity.com/2024/05/why-your-wi-fi-router-doubles-as-an-apple-airtag/
24/05/2024 15:09:30
QRCode
archive.org

Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geo-locate devices. Researchers from the University of Maryland say they relied on publicly available…

krebsonsecurity EN 2024 Wi-Fi Router Apple WPS privacy location
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers https://www.bleepingcomputer.com/news/security/poc-exploit-released-for-rce-zero-day-in-d-link-exo-ax4800-routers/
15/05/2024 00:24:02
QRCode
archive.org
thumbnail

The D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.

bleepingcomputer EN 2024 Authentication-Bypass D-Link Exploit Proof-of-Concept Remote-Command-Execution Router Vulnerability Zero-Day Security InfoSec Computer-Security
Russian hackers hijack Ubiquiti routers to launch stealthy attacks https://www.bleepingcomputer.com/news/security/russian-hackers-hijack-ubiquiti-routers-to-launch-stealthy-attacks/
03/03/2024 20:20:43
QRCode
archive.org
thumbnail

Russian APT28 military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with the NSA, the U.S. Cyber Command, and international partners.
#APT28 #Computer #FBI #InfoSec #Router #Russia #Security #Ubiquiti

Security Computer InfoSec APT28 FBI Ubiquiti Router Russia
QNAP VioStor NVR vulnerability actively exploited by malware botnet https://www.bleepingcomputer.com/news/security/qnap-viostor-nvr-vulnerability-actively-exploited-by-malware-botnet/
16/12/2023 17:25:37
QRCode
archive.org
thumbnail

A Mirai-based botnet named 'InfectedSlurs' is exploiting a remote code execution (RCE) vulnerability in QNAP VioStor NVR (Network Video Recorder) devices to hijack and make them part of its DDoS (distributed denial of service) swarm.
#Actively #Botnet #Computer #Exploited #FXC #InfectedSlurs #InfoSec #Malware #QNAP #Router #Security #Vulnerability

bleepingcomputer EN 2023 FXC QNAP InfectedSlurs Actively Botnet Malware Exploited Computer Router Vulnerability
AVrecon malware infects 70,000 Linux routers to build botnet https://www.bleepingcomputer.com/news/security/avrecon-malware-infects-70-000-linux-routers-to-build-botnet/
15/07/2023 13:59:09
QRCode
archive.org
thumbnail

Since at least May 2021, stealthy Linux malware called AVrecon was used to infect over 70,000 Linux-based small office/home office (SOHO) routers and add them to a botnet designed to steal bandwidth and provide a hidden residential proxy service.

bleepingcomputer EN 2023 AVrecon Botnet Linux Malware RAT Router
ASUS urges customers to patch critical router vulnerabilities https://www.bleepingcomputer.com/news/security/asus-urges-customers-to-patch-critical-router-vulnerabilities/
19/06/2023 20:33:34
QRCode
archive.org
thumbnail

ASUS has released new firmware with cumulative security updates that address vulnerabilities in multiple router models, warning customers to immediately update their devices or restrict WAN access until they're secured.

bleepingcomputer EN 2023 ASUS Patch Router Security-Update CVE-2022-26376 CVE-2018-1160
4368 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio