• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new variant of russian cyclops blink botnet targeting asus routers

New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers

You are here: Home / General Cyber Security News / New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers
March 18, 2022

ASUS routers have emerged as the focus on of a nascent botnet termed Cyclops Blink, practically a month soon after it was revealed the malware abused WatchGuard firewall appliances as a stepping stone to gain distant access to breached networks.

According to a new report revealed by Development Micro, the botnet’s “major purpose is to construct an infrastructure for more attacks on significant-value targets,” offered that none of the infected hosts “belong to critical organizations, or these that have an evident value on economic, political, or armed service espionage.”

Intelligence businesses from the U.K. and the U.S. have characterized Cyclops Blink as a replacement framework for VPNFilter, yet another malware that has exploited network devices, generally smaller business office/residence office (SOHO) routers, and network-attached storage (NAS) units.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

Both VPNFilter and Cyclops Blink have been attributed to a Russian point out-sponsored actor tracked as Sandworm (aka Voodoo Bear), which has also been linked to a variety of large-profile intrusions, together with that of the 2015 and 2016 attacks on the Ukrainian electrical grid, the 2017 NotPetya attack, and the 2018 Olympic Destroyer attack on the Wintertime Olympic Games.

Penned in the C language, the superior modular botnet has an effect on a range of ASUS router products, with the enterprise acknowledging that it is really doing the job on an update to address any probable exploitation –

  • GT-AC5300 firmware below 3…4.386.xxxx
  • GT-AC2900 firmware underneath 3…4.386.xxxx
  • RT-AC5300 firmware beneath 3…4.386.xxxx
  • RT-AC88U firmware less than 3…4.386.xxxx
  • RT-AC3100 firmware underneath 3…4.386.xxxx
  • RT-AC86U firmware beneath 3…4.386.xxxx
  • RT-AC68U, AC68R, AC68W, AC68P firmware under 3…4.386.xxxx
  • RT-AC66U_B1 firmware below 3…4.386.xxxx
  • RT-AC3200 firmware underneath 3…4.386.xxxx
  • RT-AC2900 firmware below 3…4.386.xxxx
  • RT-AC1900P, RT-AC1900P firmware under 3…4.386.xxxx
  • RT-AC87U (end-of-lifetime)
  • RT-AC66U (stop-of-life)
  • RT-AC56U (finish-of-lifestyle)

Cyclops Blink, aside from using OpenSSL to encrypt communications with its command-and-manage (C2) servers, also incorporates specialised modules that can go through and create from the devices’ flash memory, granting it the ability to accomplish persistence and endure manufacturing facility resets.

A 2nd reconnaissance module serves as a channel for exfiltrating data from the hacked machine back to the C2 server, even though a file down load component usually takes charge of retrieving arbitrary payloads optionally by way of HTTPS.

Prevent Data Breaches

Given that June 2019, the malware is stated to have impacted WatchGuard units and Asus routers positioned in the U.S., India, Italy, Canada, and Russia. Some of the influenced hosts belong to a regulation agency in Europe, a medium-sized entity manufacturing professional medical equipment for dentists in Southern Europe, and a plumbing organization in the U.S.

With IoT devices and routers starting to be a worthwhile attack area thanks to the infrequency of patching and the absence of security software, Development Micro warned that this could lead to the formation of “eternal botnets.”

“As soon as an IoT unit is contaminated with malware, an attacker can have unrestricted internet accessibility for downloading and deploying additional stages of malware for reconnaissance, espionage, proxying, or something else that the attacker would like to do,” the scientists explained.

“In the situation of Cyclops Blink, we have witnessed equipment that were compromised for about 30 months (about two and a half many years) in a row and were being getting set up as secure command-and-regulate servers for other bots.”

Found this post exciting? Observe THN on Facebook, Twitter  and LinkedIn to study a lot more special articles we put up.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «dev sabotages popular npm package to protest russian invasion Dev Sabotages Popular NPM Package to Protest Russian Invasion
Next Post: Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang google uncovers 'initial access broker' working with conti ransomware gang»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.