Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

Thousands of Asus Routers Hacked by China Hackers

Image © Arstechnica
Security researchers say thousands of Asus routers have been compromised by a suspected China-state group in an operation named WrtHug, focusing on outdated models with unclear aims.

Security researchers say thousands of Asus routers have been compromised by a suspected China-state group in an operation named WrtHug, focusing on seven router models that are no longer supported by the vendor.

The attackers appear to target devices past end-of-life, meaning they no longer receive security patches. SecurityScorecard says the activity spans Taiwan and clusters in South Korea, Japan, Hong Kong, Russia, central Europe, and the United States.

Experts say the operation could be used for espionage rather than overt disruption, drawing comparisons to ORB networks used to conceal attackers’ identities.

There is currently no confirmed post-exploit payload, but researchers warn that compromised routers may be repurposed for future operations, highlighting the persistent risk posed by consumer hardware.

To check if you’re affected, inspect the router’s admin TLS certificate. A self-signed certificate with an expiry year such as 2122 is a red flag. If you own an end-of-life Asus model, consider replacing it and disabling services like AICloud, remote administration, SSH, UPnP, and port forwarding. Models cited by researchers include DSL-AC68U, GT-AC5300, GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, and RT-AC1300UHP.

 

Arstechnica

Related News

New Mexico Co-op Partners with GOCare and Dialpad
Google Removes AI Health Overviews After Investigation
Self-healing networks may fix data by 2026
SDVI Names Eldridge COO
Ben Foster to Lead NTCA Board
Beyond the Cable hits 50th episode milestone

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more