Multiple ASUS router models are vulnerable to the Russia-linked Cyclops Blink malware threat, causing the vendor to publish an advisory with mitigations for the security risk. Cyclops Blink is a malware linked to the Russian-backed Sandworm hacking group that has historically targeted WatchGuard Firebox and other SOHO network devices. The role of Cyclops Blink is to establish persistence for threat actors on the device, allowing them a point of remote access to compromised networks. Since Cyclops Blink is modular, it can be easily updated to target new devices, constantly refreshing its scope and tapping into new pools of exploitable hardware. In a coordinated disclosure, Trend Micro warned that the malware features a specialized module that targets several ASUS routers, allowing the malware to read the flash memory to gather information about critical files, executables, data, and libraries. The malware then receives a command to nest in the flash memory and establish permanent persistence, as this storage space doesn’t get wiped even by factory resets.
For more details on the ASUS module of Cyclops Blink, Trend Micro has published a technical writeup today explaining how it works. At this point, the spread of Cyclops Blink appears indiscriminate and widespread.
As the malware is tied to the elite Sandworm hacking group (also tracked as Voodoo Bear, BlackEnergy, and TeleBots), we will likely see the threat actors targeting other router manufacturers in the future. Sandworm has been linked to other well-known cyberattacks, including the BlackEnergy malware behind the Ukrainian blackouts of 2015 and 2016 and the NotPetya ransomware, which led to billions worth of damage to companies worldwide starting in June 2017.