Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’

Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’

Posted on November 20, 2025November 20, 2025 By CWS

A Chinese language state-sponsored menace actor has compromised tens of 1000’s of Asus routers to determine a persistent community in help of world espionage campaigns, SecurityScorecard reviews.

As a part of the obvious Operational Relay Field (ORB) facilitation marketing campaign, dubbed Operation WrtHug (PDF), the hackers exploited recognized vulnerabilities to compromise the routers’ AiCloud service, which permits customers to entry native storage from the web.

The exploited bugs embrace CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348, and CVE-2023-39780 (CVSS rating of 8.8), that are high-severity command injection points rooted within the inadequate filtering of particular characters.

Moreover, the menace actor was seen exploiting two AiCloud service bugs, specifically CVE-2024-12912, a high-severity command execution defect, and CVE-2025-2492, a critical-severity improper authentication management flaw.

On all compromised gadgets, principally discontinued fashions, the hackers put in a shared, self-signed TLS certificates that has a 100-year expiration interval from April 2022, which can be utilized as an indicator-of-compromise (IoC).

“As soon as the hackers compromise a tool, it turns into a part of a world community of contaminated routers. SecurityScorecard’s STRIKE group recognized over 50,000 distinctive IP addresses belonging to those compromised gadgets during the last six months,” SecurityScorecard notes.

A lot of the gadgets (between 30% and 50%) are in Taiwan, however the cybersecurity agency additionally recognized clusters within the US, Russia, Southeast Asia, and Europe.

That is the second China-linked ORB operation focusing on internet-accessible Asus routers, after the AyySSHush community was uncovered earlier this yr.Commercial. Scroll to proceed studying.

“This marketing campaign seems to be part of a rising set of campaigns from China-linked hackers trying to quietly develop a large community of contaminated gadgets they’ll use to determine persistent presence and stay hidden,” SecurityScorecard says.

The safety agency has recognized solely seven IP addresses compromised in each WrtHug and AyySSHush assaults and believes that they may very well be a single, evolving marketing campaign, or that the identical menace actor is behind each. It doesn’t exclude that they may very well be operated by two teams that coordinate their actions.

“In the meanwhile, we lack substantial proof past the shared vulnerability to help these speculations. We are going to proceed to trace Operation WrtHug as a separate marketing campaign till such proof arises,” the corporate notes.

All of the vulnerabilities exploited in these campaigns have been patched and are primarily current in outdated and discontinued fashions, together with 4G-AC55U, 4G-AC860U, DSL-AC68U, GT-AC5300, GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, and RT-AC1300UHP.

Customers are suggested to use patches for the exploited vulnerabilities as quickly as doable or to switch older Asus router gadgets with newer, supported fashions.

Associated: CISA Updates Steerage on Patching Cisco Gadgets Focused in China-Linked Assaults

Associated: Microsoft: Russia, China More and more Utilizing AI to Escalate Cyberattacks on the US

Associated: China’s Salt Hurricane Hacked Vital Infrastructure Globally for Years

Associated: Man Helped People in China Get Jobs Involving Delicate US Authorities Initiatives

Security Week News Tags:ASUS, Hacked, Operation, Routers, WrtHug

Post navigation

Previous Post: Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide
Next Post: TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access

Related Posts

Critical Apache Tika Vulnerability Leads to XXE Injection Critical Apache Tika Vulnerability Leads to XXE Injection Security Week News
Douglas Day: From Engineer to Ethical Hacker Douglas Day: From Engineer to Ethical Hacker Security Week News
Wytec Expects Significant Financial Loss Following Website Hack Wytec Expects Significant Financial Loss Following Website Hack Security Week News
Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites Security Week News
Memcyco Raises  Million for Anti-Impersonation Technology Memcyco Raises $37 Million for Anti-Impersonation Technology Security Week News
Swedish Truck Giant Scania Investigating Hack Swedish Truck Giant Scania Investigating Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News