

At this point, proxy chains can transmit exploits into the network or watch traffic moving into, out of, and around the network. As a result, corporations and other organizations are in danger.īusiness owners and managers, along with IT and tech personnel, should be aware that once a device is compromised, the hackers will have the liberty to access and manipulate connected devices. The hackers have likely been thriving on the perimeter of networks for a lengthy period of time. Therefore, digital security specialists insist ZuoRAT is still zeroing in on target devices. The ZuoRAT hacker is a high-level digital miscreant with advanced capabilities. What Should Corporations and Other Organizations do to Defend the Threat? The hackers use the Chinese word, so it only makes sense that their selected term becomes part of the threat's moniker. The virus is referred to as “ZuoRAT” as it is a reference to the Chinese word used to refer to the “left” direction. The final component of the digital attack was rotating the proxy routers for added covertness. Hackers leveraged routers as proxy C2s concealed within plain sight through communication to and from routers to bypass detection. The hackers shifted the starting exploit from dedicated virtual private servers to avoid detection. As a result, digital forensics investigators insist a professional designed the attack. It is also interesting to note that the threat actors went to great lengths to conceal communication with their central command headquarters during the attack. Using such methods harmoniously makes it clear that the attacker responsible for the hack is reasonably sophisticated. As noted by Black Lotus Labs, the malware's movement to a LAN by way of a SOHO device and ability to perform additional attacks makes it much more likely that a government is responsible for the attack. The ZuoRAT might result from a nation-state's hostility toward specific targets. The hackers pounced on the opportunity to manipulate unpatched routers after the pandemic started and employees were required to work from home. Then, it conducts man-in-the-middle attacks by way of overtaking HTTPS and DNS. The malware accesses the local LAN and obtains packets sent using the device. The threat takes advantage of existing susceptibilities to zero in on some of the industry's top routers.

Zuo malware is a multistage remote access virus. Clearly, an advanced hacker is responsible for this digital attack. Therefore, router devices provided by the likes of Netgear, Asus, and Cisco are susceptible to multistage malware that has been a known threat since the spring of 2020. SOHO routers work for both home office networks and small offices.


The difference between regular routers and SOHO routers is the structure. SOHO routers transmit wireless and wired broadband routing across networks. If you own a SOHO router, you should be aware that ZuoRAT has the potential to take it over.
