ZuoRAT Malware Targets SOHO Routers To Infiltrate Networks

June 30, 2022

Researchers from Lumen’s Black Lotus Labs threat intelligence unit have discovered a remote access trojan (RAT) called ZuoRAT. The malware targets remote employees by exploiting vulnerabilities in unpatched small office/home office (SOHO) routers.

The researchers estimate that at least 80 targets were affected by the campaign.

Lumen believes that the capabilities of the malware suggest that it was the work of a highly sophisticated actor.

These capabilities include “gaining access to SOHO devices of different makes and models, collecting host and LAN information to inform targeting, sampling and hijacking network communications to gain potentially persistent access to in-land devices, and intentionally stealth C2 infrastructure leveraging multistage siloed router to router communications.”

Lumen admits, however, that it has limited insight into the broader capabilities of the actor, but Lumen’s researchers are “confident” that the elements it is tracking are part of a broader campaign.

SOHO router manufacturers compromised include ASUS, Cisco, DrayTek, and Netgear.

The sources for this piece include an article in ZDNet.

Top Stories

Related Articles

February 6, 2026 Alphabet is sharply increasing its bet on generative artificial intelligence, lifting its 2026 capital spending plans to more...

February 6, 2026 The competition between OpenAI and Anthropic intensified this week after both companies unveiled new artificial intelligence models more...

February 6, 2026 Artificial intelligence may already be cutting into entry-level job opportunities for young people in Canada, Bank of more...

February 6, 2026 The Wikimedia Foundation announced in January that it is partnering with major AI companies, including Amazon, Meta, more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn