Subj : Asus routers across the globe hit by suspected Chinese cyberattac To : All From : TechnologyDaily Date : Wed Nov 19 2025 17:30:09 Asus routers across the globe hit by suspected Chinese cyberattack - here's what we know Date: Wed, 19 Nov 2025 17:02:00 +0000 Description: State-sponsored actors are creating a large operational relay network and are using Taiwanese routers to do so. FULL STORY ======================================================================Thousand s of expired ASUS routers hijacked into Operation WrtHug cyber-espionage botnet Chinese state-sponsored actors exploit multiple n-day flaws, using 100-year TLS certificates Compromised routers form relay network, mostly in Taiwan and Southeast Asia Thousands of expired ASUS routers are being hijacked and assimilated into a botnet being used as infrastructure for cyber-espionage operations, experts have warned. Security researchers SecurityScorecard, together with Asus, discovered and reported the malicious campaign, claiming a group of Chinese state-sponsored threat actors have been leveraging multiple vulnerabilities in a number of ASUS routers to deploy a unique, self-signed certificate. The vulnerabilities being abused include CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348, CVE-2024-12912, and CVE-2025-2492. These are all n-day flaws, meaning theyve been around for relatively long. However, since the targeted endpoints reached their end-of-life, most never received the update, or simply werent patched by their users. Chinese activity Here is the list of the models being assimilated into the botnet: 4G-AC55U 4G-AC860U DSL-AC68U GT-AC5300 GT-AX11000 RT-AC1200HP RT-AC1300GPLUS RT-AC1300UHP The number of hijacked routers is being counted in the thousands, as per the report. All of them share a unique, self-signed TLS certificate, with a 100-year expiration date. This unusually long-lived certificate is a critical indicator of compromise and points to a level of coordination that reflects careful and calculated espionage, the researchers said. The infected routers become part of a large operational relay network, similar to other China-linked Operational Relay Box (ORB) campaigns. The routers become nodes that let the actors route their own espionage traffic through innocent peoples routers, hide their real origin when conducting intrusions, build resilient, globally distributed C2 infrastructure and, ultimately, stage attacks against high-value geopolitical targets. The vast majority of the compromised routers are located in Taiwan and Southeast Asia, which perfectly aligns with Chinese national interests. No compromised routers were found in mainland China, it was said. The campaign is dubbed Operation WrtHug, since the devices are running firmware called AsusWRT. Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button! And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too. ====================================================================== Link to news story: https://www.techradar.com/pro/security/asus-routers-across-the-globe-hit-by-su spected-chinese-cyberattack-heres-what-we-know --- Mystic BBS v1.12 A49 (Linux/64) * Origin: tqwNet Technology News (1337:1/100) .