PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要快速浏览一下文章,抓住主要信息。 文章讲的是一个叫PolarEdge的恶意软件,属于僵尸网络。它被用来攻击路由器,比如Cisco、ASUS、QNAP和Synology这些品牌的。这个恶意软件通过TLS协议来监听连接并执行命令。攻击者利用了Cisco路由器的一个已知漏洞(CVE-2023-20118)来下载一个shell脚本,进而安装PolarEdge后门。 PolarEdge有两种模式:连接回模式和调试模式。配置信息经过XOR加密,用0x11作为密钥解密。它还会移动和删除某些文件,但具体原因不明。此外,它还有反分析技术,比如进程伪装和随机选择进程名。 文章还提到另一个工具GhostSocks,可以将被感染设备变成SOCKS5代理,并且已经被集成到Lumma Stealer中用于牟利。 现在我需要把这些要点浓缩到100字以内。确保涵盖恶意软件名称、攻击目标、功能、攻击手段以及相关工具的信息。 </think> 文章描述了PolarEdge僵尸网络恶意软件的运作机制及其对路由器的攻击行为。该恶意软件通过TLS协议监听连接并执行命令,并利用已知漏洞CVE-2023-20118传播。其功能包括指纹识别、命令接收及文件操作,并采用反分析技术如进程伪装以规避检测。此外,文章还提到GhostSocks工具可将受感染设备转化为SOCKS5代理用于牟利。 2025-10-21 13:47:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Botnet Campaign

Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge.

PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose.

The TLS-based ELF implant, at its core, is designed to monitor incoming client connections and execute commands within them.

Then, in August 2025, attack surface management platform Censys detailed the infrastructural backbone powering the botnet, with the company noting that PolarEdge exhibits characteristics that are consistent with an Operational Relay Box (ORB) network. There is evidence to suggest that the activity involving the malware may have started as far back as June 2023.

DFIR Retainer Services

In the attack chains observed in February 2025, the threat actors have been observed exploiting a known security flaw impacting Cisco routers (CVE-2023-20118) to download a shell script named "q" over FTP, which is then responsible for retrieving and executing the PolarEdge backdoor on the compromised system.

"The backdoor's primary function is to send a host fingerprint to its command-and-control server and then listen for commands over a built-in TLS server implemented with mbedTLS," the French cybersecurity company said in a technical breakdown of the malware.

PolarEdge is designed to support two modes of operation: a connect-back mode, where the backdoor acts as a TLS client to download a file from a remote server, and debug mode, where the backdoor enters into an interactive mode to modify its configuration (i.e., server information) on-the-fly.

The configuration is embedded in the final 512 bytes of the ELF image, obfuscated by a one-byte XOR that can be decrypted with single-byte key 0x11.

However, its default mode is to function as a TLS server in order to send a host fingerprint to the command-and-control (C2) server and wait for commands to be sent. The TLS server is implemented with mbedTLS v2.8.0 and relies on a custom binary protocol for parsing incoming requests matching specific criteria, including a parameter named "HasCommand."

Encryption algorithms used to obfuscate parts of the backdoor

If the "HasCommand" parameter equals the ASCII character 1, the backdoor proceeds to extract and run the command specified in the "Command" field and transmits back the raw output of the executed command.

Once launched, PolarEdge also moves (e.g., /usr/bin/wget, /sbin/curl) and deletes certain files ("/share/CACHEDEV1_DATA/.qpkg/CMS-WS/cgi-bin/library.cgi.bak") on the infected device, although the exact purpose behind this step is unclear.

Furthermore, the backdoor incorporates a wide range of anti-analysis techniques to obfuscate information related to the TLS server setup and fingerprinting logic. To evade detection, it employs process masquerading during its initialization phase by choosing from a predefined list a name at random. Some of the names included are: igmpproxy, wscd, /sbin/dhcpd, httpd, upnpd, and iapp.

"Although the backdoor does not ensure persistence across reboots, it calls fork to spawn a child process that, every 30 seconds, checks whether /proc/<parent-pid> still exists," Sekoia researchers explained. "If the directory has disappeared, the child executes a shell command to relaunch the backdoor."

The disclosure comes as Synthient highlighted GhostSocks' ability to convert compromised devices into SOCKS5 residential proxies. GhostSocks is said to have been first advertised under the malware-as-a-service (MaaS) model on the XSS forum in October 2023.

CIS Build Kits

It's worth noting that the offering has been integrated into Lumma Stealer as of early 2024, allowing customers of the stealer malware to monetize the compromised devices post-infection.

"GhostSocks provides clients with the ability to build a 32-bit DLL or executable," Synthient said in a recent analysis. "GhostSocks will attempt to locate a configuration file in %TEMP%. In the scenario that the configuration file cannot be found, it will fall back to a hard-coded config."

The configuration contains details of the C2 server to which a connection is established for provisioning the SOCKS5 proxy and ultimately spawning a connection using the open-source go-socks5 and yamux libraries.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
如有侵权请联系:admin#unsafe.sh