Slash Boxes

SoylentNews is people

posted by janrinok on Friday May 19 2023, @11:24PM   Printer-friendly

Malware turns home routers into proxies for Chinese state-sponsored hackers

Researchers have uncovered malicious firmware that can turn residential and small office routers into proxies for Chinese state-sponsored hackers. The firmware implant, discovered by Check Point Research, includes a full-featured backdoor that allows attackers to establish communication, issue commands, and perform file transfers with infected devices. The implant was found in TP-Link routers but could be modified to work on other router models.

The malware's main purpose is to relay traffic between infected targets and command-and-control servers, obscuring the origins and destinations of the communication. The control infrastructure was traced back to hackers associated with the Chinese government. By using a chain of infected devices, the attackers can hide the final command and control and make it difficult for defenders to detect and respond to the attack.

This technique of using routers and other IoT devices as proxies is a common tactic among threat actors. The researchers are unsure how the implant is installed on devices but suspect it could be through exploiting vulnerabilities or weak administrative credentials.

While the firmware image discovered so far only affects TP-Link devices, the modular design allows the threat actors to create images for a wider range of hardware. The article concludes with recommendations for users to check for potential infections and apply proactive mitigations such as patching routers and using strong passwords.

Original Submission

This discussion was created by janrinok (52) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Interesting) by Anonymous Coward on Saturday May 20 2023, @09:35AM (1 child)

    by Anonymous Coward on Saturday May 20 2023, @09:35AM (#1307118)

    How are Check Point so sure they're from the Chinese Gov? There are lots of non-Gov Chinese people doing illegal or dubious stuff to make money... And building botnets could be one of them.

    On stuff that I administer, on the firewall logs I see a lot of attempts from Digital Ocean. But I don't claim they're from US Gov sponsored hackers...

    Starting Score:    0  points
    Moderation   +1  
       Troll=1, Interesting=2, Total=3
    Extra 'Interesting' Modifier   0  

    Total Score:   1  
  • (Score: 0) by Anonymous Coward on Saturday May 20 2023, @02:38PM

    by Anonymous Coward on Saturday May 20 2023, @02:38PM (#1307140)

    Easy to discover. Log the router requests, trace back the IPs. Eventually you can get through the layers to find where someone is coming from. Or, let them in and see what they do. Make a router into a honeypot.