ASUS Routers, Cyclops Blink, Malware, Attack, Electro4u, Persistent
Cyclops Blink Malware Launches Campaign Against ASUS Routers
Tech experts have recently uncovered a new strain of malware, dubbed “Cyclops Blink,” that has been launching persistent attacks on several popular ASUS routers. The malware exploits two separate vulnerabilities in the routers’ firmware, allowing attackers to gain access and control of the routers.
The attack starts with an initial request to the router’s web interface. If successful, the malware then downloads an executable file onto the router, allowing the attacker to run arbitrary code on the device. Additionally, it modifies the router’s settings so that it will always allow remote access to the router from the attacker’s IP address.
Cyclops Blink is particularly dangerous because of its persistence. The malware is designed to stay present on the router even if the device is rebooted or the firmware is updated. This allows the attacker to maintain control of the system indefinitely, which can cause significant long-term damage.
ASUS has already released a security patch for the affected routers, and the company is recommending that users update their devices as soon as possible. Additionally, users should consider changing their router’s default password to a secure, unique one that is more difficult for attackers to guess.