![](https://static.wixstatic.com/media/424b39_15f0514e5af347d7ac06ae0d0c7a039c~mv2.jpg/v1/fill/w_728,h_380,al_c,q_80,enc_auto/424b39_15f0514e5af347d7ac06ae0d0c7a039c~mv2.jpg)
SOHO (Small Office/Home Office) routers, the silent gatekeepers of your digital domain, are not as safe as you might think. A new, disturbing trend has come to light – they have become the prime targets of a silent and insidious cyber threat. AVrecon, a potent malware strain, has been clandestinely attacking these unsuspecting gateways for more than two years, creating an international botnet spanning 20 countries.
The Threat Landscape
This concerning discovery was brought forth by Lumen Black Lotus Labs, who has dubbed the stealthy malware "AVrecon". This nefarious program joins the ranks of ZuoRAT and HiatusRAT, making it the third of its kind to single out SOHO routers. With an alarming infiltration of over 70,000 devices and a botnet comprising 40,000 nodes, AVrecon has established itself as one of the most extensive SOHO router-targeting botnets.
Global Reach, Unseen Damage
The global reach of this cyber plague is formidable. It has claimed victims predominantly in the UK and the US, but Argentina, Nigeria, Brazil, Italy, Bangladesh, Vietnam, India, Russia, and South Africa are not spared either.
Ye (Seth) Jin, a senior security researcher from Kaspersky, was the first to shed light on AVrecon's existence in May 2021. Since then, the malware has successfully evaded detection, continually expanding its sphere of influence.
![](https://static.wixstatic.com/media/424b39_ac21c76229ec42a8acae904006637763~mv2.jpg/v1/fill/w_728,h_380,al_c,q_80,enc_auto/424b39_ac21c76229ec42a8acae904006637763~mv2.jpg)
The Modus Operandi
Upon a successful infection, AVrecon embarks on a detailed enumeration of the victim's SOHO router. It then stealthily exfiltrates this information back to a hidden command-and-control (C2) server embedded within the host system. Additionally, it terminates any process bound to port 48102, a tactic to eliminate competition from other malware instances.
The infection then progresses to the next stage, where the compromised system establishes contact with a secondary C2 server and awaits further instructions. Researchers have identified 15 unique servers of this type active since October 2021.
AVrecon, coded in C programming language, can easily port across different architectures. Its primary leverage point is the edge infrastructure, typically devoid of adequate security solutions. The evidence gathered points towards the botnet's involvement in clicking various Facebook and Google ads and interacting with Microsoft Outlook, hinting at a two-pronged approach to conduct advertising fraud and data exfiltration.
Cybersecurity Implications and Mitigation
In a CSOC (Cyber Security Operations Center) environment, such botnets pose a significant threat due to their stealthy nature. They can compromise essential infrastructure, leading to significant data breaches and financial loss.
To combat this threat, cybersecurity professionals need to implement robust detection systems that can identify and neutralize such attacks in their early stages. Regular security audits, stringent network hygiene, and the use of sophisticated endpoint detection and response (EDR) solutions can significantly mitigate the risk. Additionally, educating the end-users about the risks and encouraging them to regularly update their SOHO router's firmware is critical.
Key Terms and Definitions:
SOHO Router: A device that connects small office/home office networks to the internet.
Botnet: A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
Malware: Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Command-and-Control (C2) Server: A computer controlled by a cybercriminal used to send commands to systems compromised by malware.
Data Exfiltration: Unauthorized transfer of data from a computer.
Cyber Security Operations Center (CSOC): A centralized unit that deals with security issues on an organizational and technical level.
Summary
AVrecon is a new malware strain that has silently been infiltrating SOHO routers across 20 countries, compromising over 70,000 devices. This has resulted in one of the largest router-targeting botnets ever seen. The botnet has been used for criminal activities, including digital advertising fraud and data exfiltration.
Comments