• About
  • Disclaimer
  • Privacy Policy
  • Contact
Monday, June 2, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

New botnet hijacks AI-powered safety device on Asus routers

Md Sazzad Hossain by Md Sazzad Hossain
0
New botnet hijacks AI-powered safety device on Asus routers
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

DragonForce targets rivals in a play for dominance – Sophos Information

This month in safety with Tony Anscombe – Could 2025 version

Discovering new Companions with Options for Have I Been Pwned Customers



GreyNoise mentioned its in-house AI device, SIFT, flagged suspicious visitors geared toward disabling and exploiting a TrendMicro-powered safety function, AiProtection, enabled by default on Asus routers.

Trojanizing the security web

Asus’ AiProtection, developed with TrendMicro, is a built-in, enterprise-grade safety suite for its routers, providing real-time menace detection, malware blocking, and intrusion prevention utilizing cloud-based intelligence.

After gaining administrative entry on the routers, both by brute-forcing or exploiting recognized authentication bypass vulnerabilities of “login.cgi” — a web-based admin interface, the attackers exploit an authenticated command injection flaw (CVE-2023-39780) to create an empty file at /tmp/BWSQL_LOG.

Doing this prompts the BWDPI (Bidirectional Internet Information Packet Inspection) logging function, a part of Asus’ AiProtection suite geared toward inspecting incoming and outgoing visitors. With logging turned on, attackers can feed crafted (malicious) payloads into the router’s visitors, as BWDPI will not be meant to deal with arbitrary information.

On this explicit case, the attackers use this to allow SSH on a non-standard port and add their very own keys, making a stealthy backdoor. “As a result of this secret is added utilizing the official Asus options, this config change is persevered throughout firmware upgrades,” GreyNoise researchers mentioned. “In case you’ve been exploited beforehand, upgrading your firmware will NOT take away the SSH backdoor.”

Whereas GreyNoise didn’t specify a selected CVE used as an authentication bypass for preliminary entry, Asus not too long ago acknowledged a crucial authentication bypass vulnerability, tracked as CVE-2025-2492, affecting routers with the AiCloud function enabled.

Tags: AIPoweredAsusBotnethijacksRoutersSecurityTool
Previous Post

Enumeration Lab – 51 Safety

Next Post

How Mildew Harm Remediation Works

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

DragonForce targets rivals in a play for dominance – Sophos Information
Cyber Security

DragonForce targets rivals in a play for dominance – Sophos Information

by Md Sazzad Hossain
June 2, 2025
This month in safety with Tony Anscombe – Could 2025 version
Cyber Security

This month in safety with Tony Anscombe – Could 2025 version

by Md Sazzad Hossain
June 1, 2025
Discovering new Companions with Options for Have I Been Pwned Customers
Cyber Security

Discovering new Companions with Options for Have I Been Pwned Customers

by Md Sazzad Hossain
June 1, 2025
Mixing in with the Cloud – Krebs on Safety
Cyber Security

U.S. Sanctions Cloud Supplier ‘Funnull’ as Prime Supply of ‘Pig Butchering’ Scams – Krebs on Safety

by Md Sazzad Hossain
May 31, 2025
Russian hackers focused UK Ministry of Defence
Cyber Security

Russian hackers focused UK Ministry of Defence

by Md Sazzad Hossain
May 30, 2025
Next Post
How Mildew Harm Remediation Works

How Mildew Harm Remediation Works

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Google and NVIDIA at GTC this week

Google and NVIDIA at GTC this week

March 25, 2025
The Hidden Prices of Not Utilizing HSMs in Regulated Sectors

The Hidden Prices of Not Utilizing HSMs in Regulated Sectors

April 27, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Privateness Hero 2 Function Alert: The Finest VPN Router with WireGuard & OpenVPN

Privateness Hero 2 Function Alert: The Finest VPN Router with WireGuard & OpenVPN

June 2, 2025
The Psychology Behind Creating NSFW AI Photos

The Psychology Behind Creating NSFW AI Photos

June 2, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In