Breaking News

SCUF Gaming Unveils Omega, Latest Officially Licensed Pro Controller for PS5 LiberNovo Launches Revolutionary New Ergonomic Chair Lineup Noctua presents NF-A12x25 G2 chromax.black 120mm fans INNO3D AT COMPUTEX 2026 Micron Redefines AI Performance With Sampling of 256GB DDR5 Server Module

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Hackers Distributed Malware By Compromising Asus Routers

Hackers Distributed Malware By Compromising Asus Routers

Enterprise & IT May 14,2019 0

ESET researchers have discovered that attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software.

ESET first discovered that the Plead backdoor was digitally signed by a code-signing certificate that was issued to D-Link Corporation back in July 2018.
The Plead malware is a backdoor which, according to Trend Micro, is used by the BlackTech group in targeted attacks. The BlackTech group is primarily focused on cyberespionage in Asia.

At the end of April 2019, ESET researchers utilizing ESET telemetry observed multiple attempts to deploy Plead malware in an unusual way. Specifically, the Plead backdoor was created and executed by a legitimate process named AsusWSPanel.exe. This process belongs to the Windows client for a cloud storage service called ASUS WebStorage. The executable file is digitally signed by ASUS Cloud Corporation.

ESET said that all observed Plead samples had the following file name: Asus Webstorage Upate.exe. The researchers confirmed that the AsusWSPanel.exe module of ASUS WebStorage can create files with such filenames during the software update process.

But how legitimate software could create and execute the Plead malware? A possibility could be an ASUS WebStorage supply-chain attack, under which legitimate ASUS WebStorage binaries were delivered via the same update mechanism. However, ESET says it is not aware that ASUS WebStorage servers are used as C&C servers or have served malicious binaries.The a ttackers used standalone malware files instead of incorporating malicious functionality inside legitimate software.

Another possible explanation could be the fact that the ASUS WebStorage software is vulnerable to a man-in-the-middle attack (MitM). Namely, the software update is requested and transferred using HTTP; once an update is downloaded and ready to execute, the software doesn’t validate its authenticity before execution. Thus, if the update process is intercepted by attackers, they are able to push a malicious update.

According to Trend Micro research, attackers behind the Plead malware are compromising vulnerable routers and even using them as C&C servers for the malware.

ESET's investigation uncovered that most of the affected organizations have routers made by the same producer; moreover, the admin panels of these routers are accessible from the internet. Thus, the researchers believe that a MitM attack at the router level is the most probable scenario.

ESET researchers had notified ASUS Cloud Corporation prior to the public announcement of the issue.

Attackers are constantly looking for new ways to deliver their malware in a stealthier way. Security researchers see that supply-chain and man-in-the-middle attacks are used more and more often by various attackers all around the globe.

Tags: malwareHackingASUSroutersESET
Previous Post
Google Opens European Data Privacy Center in Germany
Next Post
Chinese YMTC to Mass Produce 64-layer 3D NAND Products By This Year End

Related Posts

  • ASUS Announces ProArt Display OLED PA27USD and PA32USD

  • ASUS Announces TUF Gaming Platinum Power Supply Series

  • ASUS Announces ProArt PA40SU USB4 SSD Enclosure

  • ASUS Showcases Comprehensive AI-Powered Creator Workflows at NAB Show 2026

  • ASUS Announces ProArt Router PRT-BE5000 and ProArt Switch PQG-U1080

  • ASUS Announces Intel Core Ultra 200S Plus Series Support on W880, Z890, Q870, B860 and H810 Motherboards

  • ASUS Unveils Complete Portfolio Support for Intel Core 200S Series

  • ASUS Announces 2026 TUF Gaming Laptop Lineup

Latest News

SCUF Gaming Unveils Omega, Latest Officially Licensed Pro Controller for PS5
Gaming

SCUF Gaming Unveils Omega, Latest Officially Licensed Pro Controller for PS5

LiberNovo Launches Revolutionary New Ergonomic Chair Lineup
Consumer Electronics

LiberNovo Launches Revolutionary New Ergonomic Chair Lineup

Noctua presents NF-A12x25 G2 chromax.black 120mm fans
Cooling Systems

Noctua presents NF-A12x25 G2 chromax.black 120mm fans

INNO3D AT COMPUTEX 2026
GPUs

INNO3D AT COMPUTEX 2026

Micron Redefines AI Performance With Sampling of 256GB DDR5 Server Module
Enterprise & IT

Micron Redefines AI Performance With Sampling of 256GB DDR5 Server Module

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Introducing PriceHub

Introducing PriceHub

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed