New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research


ASUS Warns of Malware Attacks Targeting Routers

Multiple ASUS router models are vulnerable to the Russia-linked Cyclops Blink malware threat, causing the vendor to publish an advisory with mitigations for the security risk. Cyclops Blink is a malware linked to the Russian-backed Sandworm hacking group that has historically targeted WatchGuard Firebox and other SOHO network devices. The role of Cyclops Blink is to establish persistence for threat actors on the device, allowing them a point of remote access to compromised networks. Since Cyclops Blink is modular, it can be easily updated to target new devices, constantly refreshing its scope and tapping into new pools of exploitable hardware. In a coordinated disclosure, Trend Micro warned that the malware features a specialized module that targets several ASUS routers, allowing the malware to read the flash memory to gather information about critical files, executables, data, and libraries. The malware then receives a command to nest in the flash memory and establish permanent persistence, as this storage space doesn’t get wiped even by factory resets.

For more details on the ASUS module of Cyclops Blink, Trend Micro has published a technical writeup today explaining how it works. At this point, the spread of Cyclops Blink appears indiscriminate and widespread.

As the malware is tied to the elite Sandworm hacking group (also tracked as Voodoo Bear, BlackEnergy, and TeleBots), we will likely see the threat actors targeting other router manufacturers in the future. Sandworm has been linked to other well-known cyberattacks, including the BlackEnergy malware behind the Ukrainian blackouts of 2015 and 2016 and the NotPetya ransomware, which led to billions worth of damage to companies worldwide starting in June 2017.

Analyst Notes

At this time, ASUS has not released new firmware updates to protect against Cyclops Blink but have released the following mitigations that can be used to secure devices:
• Reset the device to factory default: Login into the web GUI, go to Administration → Restore/Save/Upload Setting, click the “Initialize all the setting and clear all the data log,” option and then click the Restore button.
• Update to the latest available firmware.
• Ensure the default admin password has been changed to a more secure one.
• Disable Remote Management (disabled by default, can only be enabled via Advanced Settings).
If you are using models that have reached their End of Life (EOL), note that these are no longer supported and thus won’t receive a firmware security update. In this case, it is recommended to replace the device with a new one.–.html