Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Thousands of Asus Routers Hacked by China Hackers

Image © Arstechnica
Security researchers say thousands of Asus routers have been compromised by a suspected China-state group in an operation named WrtHug, focusing on outdated models with unclear aims.

Security researchers say thousands of Asus routers have been compromised by a suspected China-state group in an operation named WrtHug, focusing on seven router models that are no longer supported by the vendor.

The attackers appear to target devices past end-of-life, meaning they no longer receive security patches. SecurityScorecard says the activity spans Taiwan and clusters in South Korea, Japan, Hong Kong, Russia, central Europe, and the United States.

Experts say the operation could be used for espionage rather than overt disruption, drawing comparisons to ORB networks used to conceal attackers’ identities.

There is currently no confirmed post-exploit payload, but researchers warn that compromised routers may be repurposed for future operations, highlighting the persistent risk posed by consumer hardware.

To check if you’re affected, inspect the router’s admin TLS certificate. A self-signed certificate with an expiry year such as 2122 is a red flag. If you own an end-of-life Asus model, consider replacing it and disabling services like AICloud, remote administration, SSH, UPnP, and port forwarding. Models cited by researchers include DSL-AC68U, GT-AC5300, GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, and RT-AC1300UHP.

 

Arstechnica

Related News

IQ Fiber Expands into Delaware Kent County Launch
All West Fiber expands Rawlins network
Preview: Connected America 2026 Agenda
Pilot Fiber Expands 400G Wavelengths in NYC
FCC Bans Foreign-Made Consumer Routers
Direct Communications Launches Mobile via gaiia in 60 Days

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more