ZuoRAT Malware Targets SOHO Routers To Infiltrate Networks

June 30, 2022

Researchers from Lumen’s Black Lotus Labs threat intelligence unit have discovered a remote access trojan (RAT) called ZuoRAT. The malware targets remote employees by exploiting vulnerabilities in unpatched small office/home office (SOHO) routers.

The researchers estimate that at least 80 targets were affected by the campaign.

Lumen believes that the capabilities of the malware suggest that it was the work of a highly sophisticated actor.

These capabilities include “gaining access to SOHO devices of different makes and models, collecting host and LAN information to inform targeting, sampling and hijacking network communications to gain potentially persistent access to in-land devices, and intentionally stealth C2 infrastructure leveraging multistage siloed router to router communications.”

Lumen admits, however, that it has limited insight into the broader capabilities of the actor, but Lumen’s researchers are “confident” that the elements it is tracking are part of a broader campaign.

SOHO router manufacturers compromised include ASUS, Cisco, DrayTek, and Netgear.

The sources for this piece include an article in ZDNet.

Top Stories

Related Articles

January 14, 2026 Anthropic says that more than 90 per cent of the software powering new versions of Claude is more...

January 14, 2026 Lenovo is repositioning itself for a world where enterprise customers no longer want to be locked into more...

January 14, 2026 A maximum-severity vulnerability in Hewlett-Packard Enterprise’s OneView management software is now being actively exploited. This has prompted more...

January 14, 2026 Anthropic is pushing deeper into healthcare with a new suite of AI tools aimed at doctors, insurers more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn