Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Hats That Make Landman Style Feel Real

    February 5, 2026

    Interview with Zemo Trevathan, Author of The Adventures of Casey, Kendall and The Stucco Beings

    February 5, 2026

    Bad Bunny, Olivia Dean & More Grammys Streaming Gains

    February 4, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»A New, Remarkably Sophisticated Malware Is Attacking Routers
    Technology

    A New, Remarkably Sophisticated Malware Is Attacking Routers

    By AdminJuly 1, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    A New, Remarkably Sophisticated Malware Is Attacking Routers


    An unusually advanced hacking group has spent almost two years infecting a wide range of routers in North America and Europe with malware that takes full control of connected devices running Windows, macOS, and Linux, researchers reported on June 28.

    So far, researchers from Lumen Technologies’ Black Lotus Labs say they’ve identified at least 80 targets infected by the stealthy malware, including routers made by Cisco, Netgear, Asus, and DrayTek. Dubbed ZuoRAT, the remote access Trojan is part of a broader hacking campaign that has existed since at least the fourth quarter of 2020 and continues to operate.

    A High Level of Sophistication

    The discovery of custom-built malware written for the MIPS architecture and compiled for small-office and home-office routers is significant, particularly given its range of capabilities. Its ability to enumerate all devices connected to an infected router and collect the DNS lookups and network traffic they send and receive and remain undetected is the hallmark of a highly sophisticated threat actor.

    “While compromising SOHO routers as an access vector to gain access to an adjacent LAN is not a novel technique, it has seldom been reported,” Black Lotus Labs researchers wrote. “Similarly, reports of person-in-the-middle style attacks, such as DNS and HTTP hijacking, are even rarer and a mark of a complex and targeted operation. The use of these two techniques congruently demonstrated a high level of sophistication by a threat actor, indicating that this campaign was possibly performed by a state-sponsored organization.”

    The campaign comprises at least four pieces of malware, three of them written from scratch by the threat actor. The first piece is the MIPS-based ZuoRAT, which closely resembles the Mirai internet-of-things malware that achieved record-breaking distributed denial-of-service attacks that crippled some Internet services for days. ZuoRAT often gets installed by exploiting unpatched vulnerabilities in SOHO devices.

    Once installed, ZuoRAT enumerates the devices connected to the infected router. The threat actor can then use DNS hijacking and HTTP hijacking to cause the connected devices to install other malware. Two of those malware pieces—dubbed CBeacon and GoBeacon—are custom-made, with the first written for Windows in C++ and the latter written in Go for cross-compiling on Linux and macOS devices. For flexibility, ZuoRAT can also infect connected devices with the widely used Cobalt Strike hacking tool.

    ZuoRAT can pivot infections to connected devices using one of two methods:

    • DNS hijacking, which replaces the valid IP addresses corresponding to a domain such as Google or Facebook with a malicious one operated by the attacker.
    • HTTP hijacking, in which the malware inserts itself into the connection to generate a 302 error that redirects the user to a different IP address.

    Intentionally Complex

    Black Lotus Labs said the command-and-control infrastructure used in the campaign is intentionally complex in an attempt to conceal what’s happening. One set of infrastructure is used to control infected routers, and another is reserved for the connected devices if they’re later infected.

    The researchers observed routers from 23 IP addresses with a persistent connection to a control server that they believe was performing an initial survey to determine if the targets were of interest. A subset of those 23 routers later interacted with a Taiwan-based proxy server for three months. A further subset of routers rotated to a Canada-based proxy server to obfuscate the attacker’s infrastructure.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleWest Virginia v EPA: What does the new US Supreme Court ruling mean for carbon emissions?
    Next Article Hannity: Democrats and the media mob are focused on one thing only

    RELATED POSTS

    A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

    February 4, 2026

    Epstein-linked longevity guru Peter Attia leaves David Protein, and his own startup ‘won’t comment’

    February 4, 2026

    Upgrade Your Roku Before the Big Game

    February 3, 2026

    Fintech CEO and Forbes 30 Under 30 alum has been charged for alleged fraud

    February 3, 2026

    Dyson Deals: WIRED’s Top Pick Pet Vacuum and Purifier Heater

    February 2, 2026

    TikTok says its services are restored after the outage

    February 2, 2026
    latest posts

    The Hats That Make Landman Style Feel Real

    We independently evaluate all recommended products and services. Any products or services put forward appear…

    Interview with Zemo Trevathan, Author of The Adventures of Casey, Kendall and The Stucco Beings

    February 5, 2026

    Bad Bunny, Olivia Dean & More Grammys Streaming Gains

    February 4, 2026

    PepsiCo is cutting prices for snacks like Doritos by ‘up to 15%’ to appease customers pinched by the K-shaped economy

    February 4, 2026

    California Dems lash out at ICE during gubernatorial debate

    February 4, 2026

    Anthony Davis joins Wizards in trade from Mavericks: report

    February 4, 2026

    A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

    February 4, 2026
    Categories
    • Books (1,044)
    • Business (5,947)
    • Events (30)
    • Film (5,884)
    • Lifestyle (3,995)
    • Music (5,986)
    • Politics (5,949)
    • Science (5,299)
    • Technology (5,878)
    • Television (5,562)
    • Uncategorized (6)
    • US News (5,936)
    popular posts

    BTS’ Jin Shares New Single “The Astronaut”: Stream

    Jin of BTS has unveiled his solo single, “The Astronaut,” a dreamy track co-written by…

    Are We On the Brink of War With Iran? By Howard Bloom

    January 26, 2024

    ‘Trans Memoria’ Director Victoria Verseau Interview: KVIFF 2024

    June 29, 2024

    Watch Legacies Online: Season 4 Episode 18

    June 5, 2022
    Archives
    Browse By Category
    • Books (1,044)
    • Business (5,947)
    • Events (30)
    • Film (5,884)
    • Lifestyle (3,995)
    • Music (5,986)
    • Politics (5,949)
    • Science (5,299)
    • Technology (5,878)
    • Television (5,562)
    • Uncategorized (6)
    • US News (5,936)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Anthony Davis joins Wizards in trade from Mavericks: report

    February 4, 2026

    A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

    February 4, 2026

    Why Are Some Women Training for Pregnancy Like It’s a Marathon?

    February 4, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT