Tuesday, June 6, 2023
  • PRESS RELEASE
  • ADVERTISE
  • CONTACT
Asia Post
No Result
View All Result
  • HOME
  • NEWS
    • INDIA
    • CHINA
    • WORLD
  • DEFENSE
  • POLITICS
  • BUSINESS
  • HEALTH
  • SPORTS
  • ENTRTAINMENT
  • TECHNOLOGY
  • LIFESTYLE
  • TRAVEL
  • OUR TEAM
Asia Post
No Result
View All Result

Malware turns home routers into proxies for Chinese state-sponsored hackers

May 17, 2023
in TECHNOLOGY
0 0
0
Share on FacebookShare on TwitterShare on Email


A stylized skull and crossbones made out of ones and zeroes.

Researchers on Tuesday unveiled a major discovery—malicious firmware that can wrangle a wide range of residential and small office routers into a network that stealthily relays traffic to command and control servers maintained by Chinese state-sponsored hackers.

A firmware implant, revealed in a write-up from Check Point Research, contains a full-featured backdoor that allows attackers to establish communications and file transfers with infected devices, remotely issue commands, and upload, download, and delete files. The implant came in the form of firmware images for TP-Link routers. The well-written C++ code, however, took pains to implement its functionality in a “firmware-agnostic” manner, meaning it would be trivial to modify it to run on other router models.

Not the ends, just the means

The main purpose of the malware appears to relay traffic between an infected target and the attackers’ command and control servers in a way that obscures the origins and destinations of the communication. With further analysis, Check Point Research eventually discovered that the control infrastructure was operated by hackers tied to Mustang Panda, an advanced persistent threat actor that both the Avast and ESET security firms say works on behalf of the Chinese government.

“Learning from history, router implants are often installed on arbitrary devices with no particular interest, with the aim to create a chain of nodes between the main infections and real command and control,” Check Point researchers wrote in a shorter write-up. “In other words, infecting a home router does not mean that the homeowner was specifically targeted, but rather that they are only a means to a goal.”

Advertisement

The researchers discovered the implant while investigating a series of targeted attacks against European foreign affairs entities. The chief component is a backdoor with the internal name Horse Shell. The three main functions of Horse Shell are:

  • A remote shell for executing commands on the infected device
  • File transfer for uploading and downloading files to and from the infected device
  • The exchange of data between two devices using SOCKS5, a protocol for proxying TCP connections to an arbitrary IP address and providing a means for UDP packets to be forwarded.

The SOCKS5 functionality seems to be the ultimate purpose of the implant. By creating a chain of infected devices that establish encrypted connections with only the closest two nodes (one in each direction), it’s difficult for anyone who stumbles upon one of them to learn the origin or ultimate destination or the true purpose of the infection. As Check Point researchers wrote:

The implant can relay communication between two nodes. By doing so, the attackers can create a chain of nodes that will relay traffic to the command and control server. By doing so, the attackers can hide the final command and control, as every node in the chain has information only on the previous and next nodes, each node being an infected device. Only a handful of nodes will know the identity of the final command and control.

By using multiple layers of nodes to tunnel communication, threat actors can obscure the origin and destination of the traffic, making it difficult for defenders to trace the traffic back to the C2. This makes it harder for defenders to detect and respond to the attack.

In addition, a chain of infected nodes makes it harder for defenders to disrupt the communication between the attacker and the C2. If one node in the chain is compromised or taken down, the attacker can still maintain communication with the C2 by routing traffic through a different node in the chain.



Source link

Tags: ChineseHackershomemalwareproxiesroutersStateSponsoredturns
ShareTweetSend

Related Posts

TECHNOLOGY

The best gaming gifts for dads this Father’s Day

June 6, 2023
TECHNOLOGY

Luckin Coffee reaches 10,000 stores in China · TechNode

June 6, 2023
TECHNOLOGY

Europe wants platforms to label AI-generated content to fight disinformation

June 6, 2023
TECHNOLOGY

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

June 6, 2023
TECHNOLOGY

In a filing, Twitter's lawyers say "Twitter Files" show no government interference at the company, implying Elon Musk is wrong about what the files revealed (Mike Masnick/Techdirt)

June 5, 2023
TECHNOLOGY

Apple Vision Pro Mixed Reality Headset Launch Impressions: Almost Unbelievable, Very Real

June 5, 2023
Load More
Next Post

Canadian Prime Minister Trudeau arrives in South Korea to discuss trade, North Korean challenge

Today Horoscope, 17 May | Unleash Your Creativity: Today's Oracle Reading for the 12 Zodiac Signs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest

Elon goes to China, Lucid is selling stock for $3 billion, and Fiat’s cutest tiny EV

June 4, 2023

IMDB ‘Review bombing’ of trending shows and movies like She-Hulk and Turning Red is ruining the credibility of online ratings

September 1, 2022

Apple Reality Pro: All you need to know about mixed-realty headset

April 25, 2023

DRDO & AeSI organise 14th Aero India International Seminar on ‘Aerospace and Defence Technologies-Way Forward’ in Bengaluru

February 12, 2023

Jim Newman Net Worth, Bio, Height, Family, Age, Weight, Wiki

February 25, 2021

Linking Together Asia’s Digital Future – The Diplomat

May 11, 2023

jardiance: Himachal Pradesh high court restrains DRL from selling BI’s diabetic drug Jardiance

March 31, 2022

We have not stepped back, the protest will continue: Sakshi Malik

May 29, 2023

3.12 cr saplings, 5% above target, were planted in Delhi-NCR in 2022-23

June 6, 2023

PM Narendra Modi accepts US leaders’ invite to address joint session of Congress on June 22

June 6, 2023

Kanichar Landslide to Be Treated as a Special Case; Compensation to Be Provided, Says Kerala Govt

June 6, 2023

Prasidh Krishna Gets Engaged To Rachana, Players Showers Love See Pics Of Beautiful Couple

June 6, 2023

Odisha train accident: Inquiry official disagrees with preliminary findings 

June 6, 2023

Shahid Kapoor says marriage is about woman ‘fixing’ man; netizens ask ‘Is Mira your babysitter?’

June 6, 2023

Labour and SNP face byelection battle after Margaret Ferrier suspension – UK politics live | Politics

June 6, 2023

Medical student dies in Karnataka, family alleges harassment by senior doctor

June 6, 2023
Asia Post

Get the latest news and follow the coverage of breaking news, local news, national, politics, and more from the Asia's top trusted sources.

Categories

  • BUSINESS
  • CHINA
  • DEFENSE
  • ENTRTAINMENT
  • HEALTH
  • INDIA
  • INDIA-NORTHEAST
  • LIFESTYLE
  • POLITICS
  • SPORTS
  • TECHNOLOGY
  • TRAVEL
  • WORLD

Recent News

  • 3.12 cr saplings, 5% above target, were planted in Delhi-NCR in 2022-23
  • PM Narendra Modi accepts US leaders’ invite to address joint session of Congress on June 22
  • Kanichar Landslide to Be Treated as a Special Case; Compensation to Be Provided, Says Kerala Govt
  • Home
  • Disclaimer
  • DMCA
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Our Team
  • Contact

Copyright © 2021 Asia Post.
Asia Post is not responsible for the content of external sites.

No Result
View All Result
  • HOME
  • NEWS
    • INDIA
    • CHINA
    • WORLD
  • DEFENSE
  • POLITICS
  • BUSINESS
  • HEALTH
  • SPORTS
  • ENTRTAINMENT
  • TECHNOLOGY
  • LIFESTYLE
  • TRAVEL
  • OUR TEAM

Copyright © 2021 Asia Post.
Asia Post is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In