Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’

Posted on November 20, 2025November 20, 2025 By CWS

A Chinese language state-sponsored menace actor has compromised tens of 1000’s of Asus routers to determine a persistent community in help of world espionage campaigns, SecurityScorecard reviews.

As a part of the obvious Operational Relay Field (ORB) facilitation marketing campaign, dubbed Operation WrtHug (PDF), the hackers exploited recognized vulnerabilities to compromise the routers’ AiCloud service, which permits customers to entry native storage from the web.

The exploited bugs embrace CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348, and CVE-2023-39780 (CVSS rating of 8.8), that are high-severity command injection points rooted within the inadequate filtering of particular characters.

Moreover, the menace actor was seen exploiting two AiCloud service bugs, specifically CVE-2024-12912, a high-severity command execution defect, and CVE-2025-2492, a critical-severity improper authentication management flaw.

On all compromised gadgets, principally discontinued fashions, the hackers put in a shared, self-signed TLS certificates that has a 100-year expiration interval from April 2022, which can be utilized as an indicator-of-compromise (IoC).

“As soon as the hackers compromise a tool, it turns into a part of a world community of contaminated routers. SecurityScorecard’s STRIKE group recognized over 50,000 distinctive IP addresses belonging to those compromised gadgets during the last six months,” SecurityScorecard notes.

A lot of the gadgets (between 30% and 50%) are in Taiwan, however the cybersecurity agency additionally recognized clusters within the US, Russia, Southeast Asia, and Europe.

That is the second China-linked ORB operation focusing on internet-accessible Asus routers, after the AyySSHush community was uncovered earlier this yr.Commercial. Scroll to proceed studying.

“This marketing campaign seems to be part of a rising set of campaigns from China-linked hackers trying to quietly develop a large community of contaminated gadgets they’ll use to determine persistent presence and stay hidden,” SecurityScorecard says.

The safety agency has recognized solely seven IP addresses compromised in each WrtHug and AyySSHush assaults and believes that they may very well be a single, evolving marketing campaign, or that the identical menace actor is behind each. It doesn’t exclude that they may very well be operated by two teams that coordinate their actions.

“In the meanwhile, we lack substantial proof past the shared vulnerability to help these speculations. We are going to proceed to trace Operation WrtHug as a separate marketing campaign till such proof arises,” the corporate notes.

All of the vulnerabilities exploited in these campaigns have been patched and are primarily current in outdated and discontinued fashions, together with 4G-AC55U, 4G-AC860U, DSL-AC68U, GT-AC5300, GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, and RT-AC1300UHP.

Customers are suggested to use patches for the exploited vulnerabilities as quickly as doable or to switch older Asus router gadgets with newer, supported fashions.

Associated: CISA Updates Steerage on Patching Cisco Gadgets Focused in China-Linked Assaults

Associated: Microsoft: Russia, China More and more Utilizing AI to Escalate Cyberattacks on the US

Associated: China’s Salt Hurricane Hacked Vital Infrastructure Globally for Years

Associated: Man Helped People in China Get Jobs Involving Delicate US Authorities Initiatives

Security Week News Tags:ASUS, Hacked, Operation, Routers, WrtHug

Post navigation

Previous Post: US and Allies Sanction Russian Bulletproof Hosting Service Providers
Next Post: TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access

Related Posts

Ransomware Gang Leaks Alleged Kettering Health Data Security Week News
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names Security Week News
Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel Security Week News
Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People Security Week News
Google Discloses Data Breach via Salesforce Hack  Security Week News
Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users
  • Doppel Raises $70 Million at $600 Million Valuation
  • TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access
  • Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’
  • US and Allies Sanction Russian Bulletproof Hosting Service Providers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users
  • Doppel Raises $70 Million at $600 Million Valuation
  • TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access
  • Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’
  • US and Allies Sanction Russian Bulletproof Hosting Service Providers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News