Cyclops_Blink

Cyclops Blink

Cyclops Blink

Botnet-enabling malware targeting network hardware


Cyclops Blink is malicious Linux ELF executable, compiled for the 32-bit PowerPC (big endian) architecture. It targeted routers and firewall devices from WatchGuard and ASUS and adds them to a botnet for command and control (C&C). The malware is reported to be originated from the hacker group Sandworm.[1]

Infection is through an exploit with the code CVE-2022-23176, which allows a privilege escalation to obtain management ability on the device.[2] After a device has been infected, it acts as a command and control server, and its software design allows for further modules to be installed and be resilient to firmware upgrades.

History

The malware has been around since at least June 2019.

Cyclops Blink was first reported on in February of 2022 after security advisories published by the United Kingdom's National Cybersecurity Centre (NCSC) and the United States' Cybersecurity and Infrastructure Security Agency (CISA) detailed its presence in the wild.

Thousands of routers were cleaned.[3] Although Sandworm has attacked Ukrainian assets in the past, the malware has not targeted Ukrainian networking equipment and is thought to be unrelated to the Russo-Ukrainian War.[4][5][6][7][8]


References

  1. "Cyclops Blink" (PDF). National Cyber Security Centre.
  2. "Security Portal - Threat". securityportal.watchguard.com.
  3. Conger, Kate; Sanger, David E. (6 April 2022). "U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks". The New York Times. Archived from the original on 7 April 2022.
  4. Hacquebord, Feike; Hilt, Stephen; Merces, Fernando (17 March 2022). "Cyclops Blink Sets Sights on Asus Routers". Trend Micro Inc. Retrieved 21 March 2022.
  5. Arntz, Pieter (2022-02-24). "Cyclops Blink malware: US and UK authorities issue alert". Malwarebytes Labs. Retrieved 2022-03-21.

Share this article:

This article uses material from the Wikipedia article Cyclops_Blink, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.