Thousands of Asus routers compromised by "ViciousTrap" backdoor

Alfonso Maruccia

Posts: 1,764   +527
Staff
The big picture: Backdoors are typically designed to bypass traditional authentication methods and provide unauthorized remote access to vulnerable network appliances or endpoint devices. The most effective backdoors remain invisible to both end users and system administrators, making them especially attractive to threat actors engaged in covert cyber-espionage campaigns.

Analysts at GreyNoise have uncovered a mysterious backdoor-based campaign affecting more than 9,000 Asus routers. The unknown cybercriminals are exploiting security vulnerabilities – some of which have already been patched – while others have never been assigned proper tracking entries in the CVE database. The story is full of "unknowns," as the attackers have yet to take visible action with the sizeable botnet they have built.

The backdoor, now tracked as "ViciousTrap," was first identified by GreyNoise's proprietary AI system, Sift. The AI detected anomalous traffic in March, prompting researchers to investigate the new threat and notify government authorities by the end of the month. Now, just days after another security company disclosed the campaign, GreyNoise has published a blog post detailing ViciousTrap.

According to the researchers, thousands of Asus networking devices have already been compromised by this stealthy backdoor. The attackers first gain access by exploiting multiple security flaws and bypassing authentication through brute-force login attempts. They then leverage another vulnerability (CVE-2023-39780) to execute commands on the router, abusing a legitimate Asus feature to enable SSH access on a specific TCP/IP port and inject a public encryption key.

The threat actors can then use their private key to remotely access the compromised routers. The backdoor is stored in the device's NVRAM and can persist even after a reboot or firmware update. According to GreyNoise, the backdoor is essentially invisible, with logging disabled to further evade detection.

The ViciousTrap campaign is slowly expanding, but the attackers have yet to reveal their intentions through specific actions or attacks. Asus has already patched the exploited vulnerabilities in recent firmware updates. However, any existing backdoor will remain functional unless an administrator has manually reviewed and disabled SSH access.

To remediate the issue, administrators should remove the public key used for unauthorized SSH access and reset any custom TCP/IP port configurations. Once these steps are taken, affected Asus routers should return to their original, uncompromised state.

GreyNoise also advises network administrators to monitor traffic for connections from the following suspicious IP addresses:

  • 101.99.91.151
  • 101.99.94.173
  • 79.141.163.179
  • 111.90.146.237

Finally, the researchers warn routers owners to always install the latest firmware updates. "If compromise is suspected, perform a full factory reset and reconfigure manually," they said.

Permalink to story:

 
Or... Use better firmware.
OpenWrt, Tomato, etc.

Closed source, for profit software should be avoided at every possible opportunity where reliability and security are paramount.

I remember having a long argument for the opposite when I was young and dumb, but now I know.
 
Or... Use better firmware.
OpenWrt, Tomato, etc.

Closed source, for profit software should be avoided at every possible opportunity where reliability and security are paramount.

I remember having a long argument for the opposite when I was young and dumb, but now I know.
I use Merlin on my Asus AX88U Pro router so I'm good here.

Also don't allow SSH to be exposed to the internet its Local lan clients only.
 
This is one of the reasons I don't connect my wireless router directly to the internet. I have a locked down hardware router that sits between the wireless router and the internet.
 
Not all routers that ASUS makes are supported by those projects.
That's why I always check if a router is supported by openwrt before getting it.
All (at least the affordable) consumer routers have terrible software support. I thought smartphones were bad when it comes to that but routers are far worse.
Thankfully openwrt runs on quite a few routers and is kept up to date.

It's not just constant security updates that make it my preferred option either. In some cases it can greatly increase stability as well. I'm with Plusnet (ISP) in the UK and the router they provide was disconnecting me from games quite frequently. Also had some latency issues in an mmo that was sensitive to it. Frustratingly it wouldn't let me set a DNS server either.
Turns out the router (hardware) is a-okay. Replace the ISP firmware with openwrt and suddenly all issues were resolved, I could set a DNS server (and configure many more options). To my surprise WiFi range increased as well, I'm guessing its better at picking a less busy band.
 
The attackers first gain access by exploiting multiple security flaws and bypassing authentication through brute-force login attempts.
If brute-force login attempts are possible, this thing was designed by id1ots.
The fact brute-force attempts succeed means not ordinary id1ots but Top 1% id1ots.

The number of wrong logins before introducing delays should be strictly limited. Not to mention that the attacker can be fooled that they logged on successfully and then observed.
 
Last edited:
Yeah we should always have a feature (preferably enabled by default) to block traffic from any IP address that failed more than X login attempts.
With X being one-digit, not in dozens or hundreds.
I have this set up on my Synology NAS and every time I log into the web interface I get some notifications about lots of IP address that have been blocked since the last time I was there.
 
Back