Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’
A Chinese threat actor is exploiting known vulnerabilities in discontinued Asus devices in an Operational Relay Box (ORB) facilitation campaign. The post Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ appeared first on SecurityWeek .
AI Analysis
Technical Summary
Operation WrtHug is a targeted campaign by a Chinese threat actor exploiting known vulnerabilities in discontinued Asus routers. These vulnerabilities are not newly discovered but remain unpatched due to the devices being out of official support. The attackers utilize an Operational Relay Box (ORB) facilitation method, which likely involves using compromised routers as relay points to anonymize their activities or to facilitate lateral movement within networks. Over 50,000 routers have been compromised globally, indicating a widespread exploitation of legacy devices. The lack of patch availability for these discontinued models means that affected users cannot remediate the vulnerabilities through standard updates, increasing the risk of persistent compromise. The attack vector likely involves remote code execution or authentication bypass vulnerabilities previously disclosed but unmitigated on these devices. The compromised routers can be leveraged for malicious activities such as data interception, man-in-the-middle attacks, or as part of a larger botnet infrastructure. Although no new exploits or zero-days are involved, the scale and persistence of the campaign highlight the risks of using unsupported hardware in critical network environments. The medium severity rating reflects the moderate impact potential and the fact that exploitation requires the presence of vulnerable, unpatched devices. No CVSS score is provided, but the threat's characteristics suggest a medium severity due to the balance of impact and exploitation complexity.
Potential Impact
European organizations using discontinued Asus routers face risks including unauthorized network access, interception of sensitive data, and potential use of compromised devices in broader malicious campaigns such as distributed denial-of-service (DDoS) attacks or lateral movement within corporate networks. The exploitation of these routers can undermine confidentiality and integrity of communications passing through them. Availability may also be affected if routers are repurposed for botnet activities or rendered unstable. Critical infrastructure entities relying on these devices for network connectivity could experience operational disruptions. The inability to patch these discontinued devices exacerbates the risk, as organizations must rely on device replacement or network-level mitigations. The campaign's scale suggests a significant threat to any European entity still operating vulnerable Asus routers, particularly in sectors such as telecommunications, government, and enterprise networks where router security is paramount.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all Asus routers in use, identifying any discontinued or unsupported models. 2. Immediately replace discontinued Asus routers with currently supported devices that receive regular security updates. 3. Where replacement is not immediately feasible, isolate vulnerable routers on segmented network zones with strict access controls to limit exposure. 4. Implement network monitoring to detect unusual traffic patterns or relay behaviors indicative of ORB facilitation or router compromise. 5. Enforce strong authentication mechanisms on all network devices, including changing default credentials and disabling remote management if not required. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect known exploitation attempts against Asus router vulnerabilities. 7. Educate IT staff about the risks of using unsupported hardware and the importance of timely hardware lifecycle management. 8. Collaborate with Asus or third-party security providers for any available unofficial patches or mitigations for discontinued models. 9. Regularly review firewall and router configurations to ensure minimal attack surface and disable unused services. 10. Prepare incident response plans specifically addressing router compromise scenarios to enable rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’
Description
A Chinese threat actor is exploiting known vulnerabilities in discontinued Asus devices in an Operational Relay Box (ORB) facilitation campaign. The post Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
Operation WrtHug is a targeted campaign by a Chinese threat actor exploiting known vulnerabilities in discontinued Asus routers. These vulnerabilities are not newly discovered but remain unpatched due to the devices being out of official support. The attackers utilize an Operational Relay Box (ORB) facilitation method, which likely involves using compromised routers as relay points to anonymize their activities or to facilitate lateral movement within networks. Over 50,000 routers have been compromised globally, indicating a widespread exploitation of legacy devices. The lack of patch availability for these discontinued models means that affected users cannot remediate the vulnerabilities through standard updates, increasing the risk of persistent compromise. The attack vector likely involves remote code execution or authentication bypass vulnerabilities previously disclosed but unmitigated on these devices. The compromised routers can be leveraged for malicious activities such as data interception, man-in-the-middle attacks, or as part of a larger botnet infrastructure. Although no new exploits or zero-days are involved, the scale and persistence of the campaign highlight the risks of using unsupported hardware in critical network environments. The medium severity rating reflects the moderate impact potential and the fact that exploitation requires the presence of vulnerable, unpatched devices. No CVSS score is provided, but the threat's characteristics suggest a medium severity due to the balance of impact and exploitation complexity.
Potential Impact
European organizations using discontinued Asus routers face risks including unauthorized network access, interception of sensitive data, and potential use of compromised devices in broader malicious campaigns such as distributed denial-of-service (DDoS) attacks or lateral movement within corporate networks. The exploitation of these routers can undermine confidentiality and integrity of communications passing through them. Availability may also be affected if routers are repurposed for botnet activities or rendered unstable. Critical infrastructure entities relying on these devices for network connectivity could experience operational disruptions. The inability to patch these discontinued devices exacerbates the risk, as organizations must rely on device replacement or network-level mitigations. The campaign's scale suggests a significant threat to any European entity still operating vulnerable Asus routers, particularly in sectors such as telecommunications, government, and enterprise networks where router security is paramount.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all Asus routers in use, identifying any discontinued or unsupported models. 2. Immediately replace discontinued Asus routers with currently supported devices that receive regular security updates. 3. Where replacement is not immediately feasible, isolate vulnerable routers on segmented network zones with strict access controls to limit exposure. 4. Implement network monitoring to detect unusual traffic patterns or relay behaviors indicative of ORB facilitation or router compromise. 5. Enforce strong authentication mechanisms on all network devices, including changing default credentials and disabling remote management if not required. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect known exploitation attempts against Asus router vulnerabilities. 7. Educate IT staff about the risks of using unsupported hardware and the importance of timely hardware lifecycle management. 8. Collaborate with Asus or third-party security providers for any available unofficial patches or mitigations for discontinued models. 9. Regularly review firewall and router configurations to ensure minimal attack surface and disable unused services. 10. Prepare incident response plans specifically addressing router compromise scenarios to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 691f1a473e6177767e7ac56d
Added to database: 11/20/2025, 1:40:23 PM
Last enriched: 11/20/2025, 1:40:37 PM
Last updated: 11/21/2025, 11:40:02 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
MediumServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
MediumWrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
MediumTwo-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign
MediumData Stolen in Eurofiber France Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.