Outdated ASUS Routers Hijacked: Operation WrtHug’s Global Invasion Unleashed

Operation WrtHug has turned outdated ASUS routers into unwitting participants of a massive botnet, mostly affecting Taiwan, the U.S., and Russia. By exploiting multiple vulnerabilities, the attackers have effectively created a router zombie apocalypse. It’s a grim reminder that even our routers aren’t safe from becoming unwitting accomplices in digital mischief.

Pro Dashboard

Hot Take:

Ah, ASUS routers, the unsung heroes of connectivity, now making headlines for all the wrong reasons. If your router has been collecting dust since the Bush administration, you’ve just unwittingly joined a new global club: the “Outdated Tech Victims of the Month.” It’s like Fight Club, but with fewer Brad Pitts and more botnets!

Key Points:

  • A new campaign, dubbed Operation WrtHug, has compromised outdated ASUS routers worldwide.
  • The attack primarily hits routers in Taiwan, the U.S., and Russia, with spillover in Southeast Asia and Europe.
  • Six security flaws in ASUS WRT routers are being exploited, with shared TLS certificates expiring in 2122.
  • 99% of affected services are linked to ASUS AiCloud, pointing fingers at China-affiliated actors.
  • Several router models, including ASUS RT-AC1200HP and GT-AX11000, are targeted.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?