STOCK TITAN

Lumen discovers new malware that targeted home-office routers for two years

Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Negative)
Tags
Rhea-AI Summary

Lumen Technologies (NYSE: LUMN) has uncovered a new remote access trojan (RAT) named ZuoRAT, which has targeted remote workers via SOHO devices for nearly two years. The operation, attributed to a likely nation-state threat actor, exploits vulnerabilities in home routers to collect data and hijack internet traffic. The campaign, active since October 2020, poses significant security risks as routers are often outside traditional security measures. Lumen advises organizations to monitor SOHO devices rigorously and ensure they are updated.

Positive
  • Discovery of ZuoRAT, a sophisticated RAT targeting remote workers, showcasing Lumen's threat intelligence capabilities.
  • Highlighting the importance of cybersecurity, potentially positioning Lumen as a leader in security solutions.
Negative
  • The existence of ZuoRAT indicates a significant and prolonged security threat to remote workers and organizations, underlining vulnerabilities.
  • Identification of nation-state involvement may elevate concerns regarding geopolitical risks tied to cyber activities.

Black Lotus Labs' global visibility led to the discovery of a remote access trojan and sophisticated campaign that aligns with nation-state activity

DENVER, June 28, 2022 /PRNewswire/ -- Black Lotus Labs, the threat intelligence arm of Lumen Technologies (NYSE: LUMN), today announced that it discovered a new remote access trojan (RAT) called ZuoRAT, which targets remote workers via their small office/home office (SOHO) devices. It is part of a complex campaign that went undetected for nearly two years. The tactics, techniques and procedures (TTPs) that analysts observed are highly sophisticated and bear the markings of what is likely a nation-state threat actor.

ZuoRAT targets remote workers via their home routers and is part of a complex, potentially nation-state campaign.

Read the full report here: https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/?utm_source=referral&utm_medium=press+release

When the pandemic forced offices to close, the rapid shift to remote work expanded security concerns as millions of employees began accessing corporate networks from home. This gave threat actors a fresh opportunity to leverage at-home devices such as SOHO routers – which are widely used but rarely monitored or patched – to collect data in transit, hijack connections, and compromise devices in adjacent networks.

"Router malware campaigns pose a grave threat to organizations because routers exist outside of the conventional security perimeter and can often have weaknesses that make compromise relatively simple to achieve," said Mark Dehus, director of threat intelligence for Lumen Black Lotus Labs. "In this campaign, we have observed a threat actor's capability to exploit SOHO routers, covertly access and modify internet traffic in ways difficult to detect and gain additional footholds in the compromised network."  

Dehus continued, "Organizations should keep a close watch on SOHO devices and look for any signs of activity outlined in this research. This level of sophistication leads us to believe this campaign might not be limited to the small number of victims observed. To help mitigate the threat, they should ensure patch planning includes routers, and confirm these devices are running the latest software available." 

Overview and Analysis of Malware Campaign
  • Black Lotus Labs recently discovered the highly targeted, sophisticated campaign which has been active in North America and Europe for nearly two years beginning in October 2020.
  • The campaign included ZuoRAT – a multi-stage RAT developed for SOHO routers leveraging known vulnerabilities – which allowed the threat actor to enumerate the adjacent home network, collect data in transit, and hijack home users' DNS/HTTP internet traffic. The actor was able to remain undetected by living on devices rarely monitored, and by hijacking DNS and HTTP traffic.
  • The hijacking capability allowed the threat actor to pivot from the router to workstations in the network where they likely deployed two additional custom-built RATs – one of which allowed for cross-platform functionality (i.e. Windows, Linux and MacOs). These additional RATs allowed the actor to upload/download files, run commands and persist on the workstation.
  • Black Lotus Labs also identified two distinct sets of command-and-control (C2) infrastructure. The first was developed for the custom workstation RAT and relied upon third-party services from Chinese companies. The second set of C2s was developed for the routers.
  • Using proprietary telemetry from the Lumen global IP backbone, Black Lotus Labs identified that, once infected, the routers communicated with other compromised routers to further obfuscate malicious activity.
  • A complete list of affected routers is included in the ZuoRAT blog.
Additional Resources: 
About Lumen Technologies and the People of Lumen:

Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With approximately 500,000 route fiber miles and serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences. Learn more about the Lumen network, edge cloud, security, communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com/home, LinkedIn: /lumentechnologies, Twitter: @lumentechco, Facebook: /lumentechnologies, Instagram: @lumentechnologies and YouTube: /lumentechnologies. Lumen and Lumen Technologies are registered trademarks in the United States.  

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/lumen-discovers-new-malware-that-targeted-home-office-routers-for-two-years-301576213.html

SOURCE Lumen Technologies

FAQ

What is ZuoRAT and how does it affect Lumen Technologies?

ZuoRAT is a remote access trojan discovered by Lumen that targets remote workers via SOHO devices, exploiting security weaknesses to collect data.

When was ZuoRAT discovered by Lumen Technologies?

Lumen Technologies announced the discovery of ZuoRAT on June 28, 2022.

What threat does ZuoRAT pose to organizations?

ZuoRAT poses a significant threat as it can hijack internet traffic and exploit routers, which are often outside traditional security perimeters.

How long has the ZuoRAT campaign been active?

The ZuoRAT campaign has been active for nearly two years, starting in October 2020.

What advice did Lumen Technologies provide to mitigate threats from ZuoRAT?

Lumen advises organizations to closely monitor SOHO devices and ensure they are running the latest software to mitigate threats.

Lumen Technologies, Inc.

NYSE:LUMN

LUMN Rankings

LUMN Latest News

LUMN Stock Data

6.57B
1.02B
2.14%
65.34%
11.07%
Telecom Services
Telephone Communications (no Radiotelephone)
Link
United States of America
MONROE