Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Artemis II Splashdown Signals A Step Closer to Mass Space Travel

      April 12, 2026

      Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

      April 8, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

        April 8, 2026

        OpenAI Expands Influence With Strategic TBPN Media Acquisition

        April 8, 2026

        Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

        April 6, 2026

        Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

        April 6, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026
      • AI

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Ai-Powered Startup Signals Rise Of One-Person Billion-Dollar Companies

        April 8, 2026

        OpenAI Secures Historic $122 Billion Funding Round at $852 Billion Valuation

        April 7, 2026
      • Security

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        DeFi Platform Drift Halts Operations After Multi-Million Dollar Crypto Hack

        April 7, 2026

        Fake WhatsApp App Exposes Users To Government Spyware Operation

        April 7, 2026

        ICE Deploys Controversial Spyware Tool In Drug Trafficking Investigations

        April 7, 2026

        Telehealth Firm Discloses Breach Amid Rising Digital Health Vulnerabilities

        April 6, 2026
      • Health

        European Crackdown Targets Social Media’s Impact on Children

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Australia Moves To Curb Social Media Addiction Among Youth With Expanded Under-16 Ban

        April 5, 2026

        Australia’s eSafety Regulator Warns Big Tech As Teens Circumvent Social Media Restrictions

        April 5, 2026

        Meta Finally Held Accountable For Harming Teens, But Real Reform Remains Uncertain

        April 2, 2026
      • Science

        Artemis II Splashdown Signals A Step Closer to Mass Space Travel

        April 12, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Blue Origin’s Orbital Data Center Push Signals New Frontier in Tech Infrastructure

        March 27, 2026

        Quantum Cryptography Pioneers Awarded Computing’s Highest Honor

        March 25, 2026
      • Tech

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        Zuckerberg Quietly Offers Musk Support As Tech Titans Align Around Government Power

        April 4, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Another Billionaire Signals Exit As California’s Taxes Drives Out High-Profile Entrepreneurs

        March 28, 2026

        Bezos Eyes $100 Billion War Chest To Rewire Legacy Industry With AI

        March 28, 2026
      TallwireTallwire
      Home»Tech»State-Sponsored Spy Net Hijacks Thousands of Home Routers
      Tech

      State-Sponsored Spy Net Hijacks Thousands of Home Routers

      Updated:February 21, 20264 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      State-Sponsored Spy Net Hijacks Thousands of Home Routers
      State-Sponsored Spy Net Hijacks Thousands of Home Routers
      Share
      Facebook Twitter LinkedIn Pinterest Email

      A newly exposed cyber espionage operation dubbed Operation WrtHug is targeting tens of thousands of outdated routers made by ASUS, primarily consumer WRT models, converting them into stealthy relay networks for suspected Chinese-state actors. According to cybersecurity firm SecurityScorecard’s STRIKE team, the campaign forces itself onto end-of-life routers via proprietary vulnerabilities in ASUS’s AiCloud service and related firmware flaws, granting near-root access and embedding persistent backdoors. The impact spans around 50,000 compromised devices worldwide, with major concentrations in Taiwan, Southeast Asia and pockets in the U.S. and Russia, though mainland China appears largely unaffected. Analysts warn this is not a simple botnet for spam or DDoS, but an infrastructure play—building a covert “infrastructure of convenience” inside consumer networks that can support long-range espionage. The campaign’s sophistication and target profile signal a heightened risk to homes and small-office routers, which traditionally receive fewer security updates and travel through network environments blind-spot.

      Sources: InfoSecurity Magazine, TechRadar

      Key Takeaways

      – Home and small-office routers, especially end-of-life models, are increasingly being repurposed by nation-state actors to provide infrastructure support for espionage rather than direct attack payloads.

      – The scale of the compromise (≈50,000 devices) and the method (leveraging proprietary apps, n-day vulnerabilities and long-term persistence) suggests this is an intelligence-gathering play rather than mere cybercrime for profit.

      – Users and network defenders often overlook the security hygiene of routers and “set-and-forget” network gear—this campaign underscores how legacy firmware, enabled remote management, and default credentials create persistent back-doors into larger infrastructure.

      In-Depth

      The discovery of Operation WrtHug signals a significant escalation in how state-sponsored cyber espionage is evolving—not by focusing solely on high-value corporate or governmental servers, but by quietly embedding itself in the vast network of home and small-office routers. The primary targets here: end-of-life ASUS WRT routers supporting the AiCloud service, which the threat actors exploit via n-day and proprietary vulnerabilities to gain high-level privileges, install custom SSH keys, disable logging, and persist across reboots and firmware updates. According to SecurityScorecard’s STRIKE threat intelligence team, the attackers appear confident and patient—using these compromised routers as operational relay boxes (ORBs) to route communication, mask provenance, and support long-term spying infrastructure.

      The geographic distribution is telling: while compromised routers are found globally, the densest clusters sit in Taiwan and Southeast Asia, with additional victims in the U.S. and Russia—but nearly no identified devices in mainland China. This suggests deliberate avoidance of domestic attribution for the perpetrating actor, aligning with intelligence-grade operations rather than opportunistic hacking. The precision and stealth of the campaign further support the idea that this is not simply a cybercrime ring seeking rent, but a strategically controlled espionage platform.

      From a practical standpoint, this incident offers troubling reminders: most consumers and small businesses treat a router like a dime-store appliance—plug it in, maybe change the password once, ignore it forever. Meanwhile, threat actors see it as one of the most under-defended front-lines of the networked world. Firmware updates usually lag behind routers; remote-management features are often left enabled; default credentials or predictable passwords persist; logging is disabled; and rarely is there any form of detection or monitoring. This combination makes routers the perfect staging platforms for intelligence-gathering networks or proxy services for more sensitive internal network operations.

      For professionals and private users alike, the steps to reduce exposure are straightforward yet often overlooked: replace or update unsupported routers, disable remote administration unless strictly needed, enforce strong admin credentials, keep firmware current, and monitor outbound traffic from your network for unusual patterns. On the institutional level, internet-service providers and network operators should re-evaluate the implicit trust placed in consumer‐grade devices on their networks—particularly given their increasing use as invisible launch pads for state-level operations.

      In a broader sense, the rise of campaigns like Operation WrtHug reflects a strategic shift: rather than seeking the flash to crash major services, threat actors are quietly embedding themselves in the infrastructure we assume is “safe”—home routers, WiFi networks, peripheral devices—then using that foothold for espionage, masking, and persistence. For defenders, the warning is clear: securing endpoints is not just about the laptop or the server—it’s about the invisible plumbing of the network, beginning at the router.

      Taiwan Tech
      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleState-Backed Hackers Breach U.S. Telecom Infrastructure Supplier After Months Undetected
      Next Article Streaming Devices Quietly Tracking Your Viewing Habits Without Consent

      Related Posts

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Popular Topics
      Series A trending spotlight Sundar Pichai Satya Nadella Series B Quantum computing Samsung Ransomware Tesla Cybertruck Sam Altman Viral Tesla Software SpaceX Tim Cook Taiwan Tech Robotics Startup UAE Tech
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.