Description

Uncovered by the STRIKE team at SecurityScorecard, the LapDogs cyber-espionage operation has breached more than 1,000 devices across the globe, marking a significant incursion into vulnerable network infrastructure. This operation is distinguished by its use of Operational Relay Boxes (ORBs) and its focus on Linux-based SOHO routers and IoT devices. At the center of the attack is a custom-built malware named ShortLeash, which enables persistent, covert access to targeted systems. To evade detection, ShortLeash disguises itself as a system service, embedding into directories like `/etc/systemd/system/` or `/lib/systemd/system/` depending on the Linux distribution. The malware employs a dual-layer encryption technique to cloak its payload and communications. It even fabricates self-signed TLS certificates that impersonate those from the Los Angeles Police Department, allowing it to blend malicious traffic with legitimate network behavior. The infection pattern shows intentional regional targeting, with most compromised devices located in the U.S., Japan, South Korea, Taiwan, and Hong Kong. Through detailed forensics, researchers identified 162 discrete intrusion sets, each showing focused and customized deployment strategies. Cybercriminals behind the LapDogs operation exploit long-standing, unpatched security flaws—specifically CVE-2015-1548 and CVE-2017-17663—commonly present in ACME mini_httpd software integrated into SOHO devices manufactured by companies like Ruckus Wireless and Buffalo Technology. These flaws enable silent compromise without user interaction. What sets LapDogs apart from traditional botnets is its precision and quiet persistence. Instead of launching noisy attacks like DDoS, it prioritizes intelligence gathering, data exfiltration, and anonymized web activity routed through infected nodes. Signs of Mandarin language in the code and an emphasis on Taiwanese systems suggest China-linked actors. Given the campaign's evolving tactics and shifting infrastructure, SecurityScorecard emphasizes the need for proactive defense strategies and behavior-based threat modeling to outpace this sophisticated adversary.