TP-Link routers targeted by state-sponsored hackers with custom malware implant.

1 min read
Source: BleepingComputer
TP-Link routers targeted by state-sponsored hackers with custom malware implant.
Photo: BleepingComputer
TL;DR Summary

Chinese state-sponsored hacking group "Camaro Dragon" has infected TP-Link routers with a custom "Horse Shell" malware to attack European foreign affairs organizations. The malware is deployed in a custom and malicious firmware designed specifically for TP-Link routers, allowing the hackers to launch attacks appearing to originate from residential networks. The deployed malware allows the threat actors full access to the device, including running shell commands, uploading and downloading files, and using it as a SOCKS proxy to relay communication between devices. Users are advised to apply the latest firmware update for their router model to patch any existing vulnerabilities and change the default admin password to something strong.

Share this article

Reading Insights

Total Reads

0

Unique Readers

3

Time Saved

4 min

vs 5 min read

Condensed

87%

849108 words

Want the full story? Read the original article

Read on BleepingComputer