The ASUS Router Hijacking: A State-Sponsored Espionage Campaign Explained (2025)

Imagine waking up to discover that your home's internet gateway—the unassuming router quietly connecting your devices to the world—has been stealthily commandeered by foreign operatives. That's the chilling reality unfolding as thousands of ASUS routers globally fall victim to a sophisticated cyber espionage operation, with strong suspicions pointing to state backing from China. But here's where it gets controversial: Is this just another chapter in the escalating cyber cold war, or does it reveal a deeper vulnerability in our everyday tech that we all overlook? Let's dive in and unpack this story, breaking down the complexities step by step so even beginners can grasp the implications.

At the heart of this issue is the WrtHug campaign, uncovered by the expert team at SecurityScorecard’s Strike threat intelligence unit. These cybersecurity pros have revealed how attackers are exploiting the proprietary AiCloud service—ASUS's cloud-based tool for remote access and data syncing—paired with 'nth-day vulnerabilities.' For those new to the term, nth-day vulnerabilities are flaws discovered and exploited long after a software patch has been released, often targeting older devices that haven't been updated. By leveraging these weaknesses in end-of-life ASUS WRT routers—models that are no longer supported with updates—the hackers achieve elevated privileges, potentially enabling command injection attacks that could let them run unauthorized code directly on the device's operating system, or even gain root-level access for full control.

Gilad Maizles, a seasoned security researcher at SecurityScorecard, puts it poignantly: 'Operation WrtHug serves as a prime example of how nation-state actors are infiltrating consumer infrastructure to establish covert, durable global surveillance networks.' He highlights the strategic focus on Small Office/Home Office (SOHO) devices—these are the routers used in homes, small businesses, and remote offices—which are increasingly seen as prime targets. This shift reflects a willingness among threat actors to invest in these 'staging points' for espionage, turning everyday gadgets into unwitting accomplices in larger schemes. Think of it like how a burglar might use a side door as a foothold to access the main house; these routers provide a hidden vantage point for monitoring or launching further attacks.

Current estimates suggest about 50,000 devices have been compromised worldwide, with hotspots in Taiwan, the United States, Russia, and various Southeast Asian and European nations. What tipped off the researchers? A peculiar self-signed TLS certificate shared across all hijacked routers, set to expire an astonishing 100 years from now. This unusually long lifespan isn't just quirky—it's a red flag of coordinated, deliberate espionage, signaling that someone has gone to great lengths to maintain a persistent presence without raising alarms.

Intrigued? Sign up today for a complimentary copy of our Future Focus 2025 report, packed with insights from over 700 senior executives on navigating AI, cybersecurity, and other pressing IT challenges. It's the go-to guide for staying ahead in this rapidly evolving landscape.

Digging deeper, the campaign relies on six specific vulnerabilities, all of which have been identified and patched by ASUS—yet they're being weaponized against outdated devices that many users forget to upgrade. Let's break them down simply: CVE-2023-41345 through CVE-2023-41348, dating back nearly two years, allow direct injection of operating system commands due to weak filtering in token modules, linking back to the broader command injection flaw CVE-2023-39780. For example, this could enable an attacker to send malicious instructions that trick the router into executing harmful actions, much like slipping a counterfeit command into a legitimate conversation. Then there's CVE-2024-12912, which permits arbitrary command execution—essentially letting hackers run whatever code they want—and CVE-2025-2492, an improper authentication vulnerability that bypasses security checks, allowing unauthorized actions through carefully crafted requests. This combination is like picking a lock with multiple tools, chaining together exploits for a seamless breach.

And this is the part most people miss: the tactics, targets, and timing align eerily with prior operations attributed to China, such as the LapDogs ORB campaign, which Strike researchers recently exposed. Some of these flaws even overlap with another suspected China-linked effort called AyySSHush, which has been hitting ASUS devices since earlier this year. The team spotted seven IP addresses showing signs of compromise in both WrtHug and AyySSHush, hinting at either a single, morphing operation or tight collaboration between groups. As the researchers note, 'These initiatives showcase a marked progression in hacker tactics. Well-funded, persistent adversaries are evolving from basic brute-force attempts to intricate, multi-phase infiltrations that string together various weaknesses.' By combining command injections with authentication bypasses, they deploy enduring backdoors via SSH (Secure Shell, a protocol for secure remote access), often repurposing the router's own features to survive restarts or firmware refreshes—ensuring their foothold sticks like digital glue.

This raises eyebrows, doesn't it? The attribution to China sparks debate: Is it fair to point fingers at nations in the murky world of cyber threats, where evidence can be circumstantial, or should we focus on the universal lesson here about ignoring device updates? Critics might argue that geopolitics overshadows the tech flaws, while others see it as a wake-up call for global accountability. What are your thoughts? Do you believe state-sponsored espionage is escalating too far, or is the real controversy in how vulnerable our personal gadgets remain? Should governments mandate stricter security for consumer devices, or is it on us as users to stay vigilant? Share your views in the comments below—we'd love to hear your take!

To stay updated on stories like this, follow ITPro on Google News at https://news.google.com/publications/CAAqIggKIhxDQklTRHdnTWFnc0tDV2wwY0hKdkxtTnZiU2dBUAE?ceid=GB:en&oc=3 for our latest news, analysis, and reviews.

MORE FROM ITPRO

  • China cyber threats: What businesses can do to protect themselves (https://www.itpro.com/security/cyber-attacks/china-cyber-threats)
  • FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries (https://www.itpro.com/security/cyber-attacks/fbi-warns-indiscriminate-salt-typhoon-hacking-campaign-has-hit-organizations-in-more-than-80-countries)
  • A new 'top-tier' Chinese espionage group is stealing sensitive data (https://www.itpro.com/security/a-new-top-tier-chinese-espionage-group-is-stealing-sensitive-data)
The ASUS Router Hijacking: A State-Sponsored Espionage Campaign Explained (2025)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Dong Thiel

Last Updated:

Views: 6207

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.