GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 (hrbrmstr@mastodon.social)'s status on Thursday, 29-May-2025 00:44:18 JST hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈

    🚨 BREAKING: GreyNoise discovered a sophisticated backdoor campaign compromising ~9,000 ASUS routers worldwide. Unlike typical malware attacks, this operation uses the router's own legitimate features to create persistent backdoors that survive firmware updates and reboots.
    1/4

    In conversation about 8 months ago from mastodon.social permalink
    • Embed this notice
      hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 (hrbrmstr@mastodon.social)'s status on Thursday, 29-May-2025 00:44:27 JST hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈
      in reply to

      The tradecraft suggests an advanced, well-resourced adversary.

      What makes this scary: Attackers chain authentication bypasses + CVE-2023-39780 to gain access, then enable SSH on port 53282 with their own public key.
      2/4

      In conversation about 8 months ago permalink
    • Embed this notice
      hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 (hrbrmstr@mastodon.social)'s status on Thursday, 29-May-2025 00:44:27 JST hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈
      in reply to

      Because it's configured through official ASUS settings, the backdoor persists in NVRAM even after patching. No malware dropped, logging disabled = nearly invisible.

      This was caught by GreyNoise's AI tool ("Sift") analyzing just 3 HTTP requests out of 23+ billion.
      3/4

      In conversation about 8 months ago permalink
      Steve's Place repeated this.
    • Embed this notice
      hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 (hrbrmstr@mastodon.social)'s status on Thursday, 29-May-2025 00:44:27 JST hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈 hrbrmstr 🇺🇦 🇬🇱 🇨🇦 🏳️‍🌈
      in reply to

      Without full PCAP + emulated router profiles, this would've stayed hidden. Check your ASUS routers for SSH on TCP/53282 NOW.

      Technical deep-dive: https://www.labs.greynoise.io//grimoire/2025-03-24-ayysshush/

      📊 Executive summary: https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
      4/4

      In conversation about 8 months ago permalink

      Attachments


      1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
        GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
        GreyNoise uncovers a stealth campaign exploiting ASUS routers, enabling persistent backdoor access via CVE-2023-39780 and unpatched techniques. Learn how attackers evade detection, how GreyNoise discovered it with AI-powered tooling, and what defenders need to know.

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.