Uncovered by the STRIKE team at SecurityScorecard, the LapDogs cyber-espionage operation has breached more than 1,000 devices across the globe, marking a significant incursion into vulnerable network infrastructure. This operation is distinguished by its use of Operational Relay Boxes (ORBs) and its focus on Linux-based SOHO routers and IoT devices. At the center of the attack is a custom-built malware named ShortLeash, which enables persistent, covert access to targeted systems. To evade detection, ShortLeash disguises itself as a system service, embedding into directories like `/etc/systemd/system/` or `/lib/systemd/system/` depending on the Linux distribution. The malware employs a dual-layer encryption technique to cloak its payload and communications. It even fabricates self-signed TLS certificates that impersonate those from the Los Angeles Police Department, allowing it to blend malicious traffic with legitimate network behavior. The infection pattern shows intentional regional targeting, with most compromised devices located in the U.S., Japan, South Korea, Taiwan, and Hong Kong. Through detailed forensics, researchers identified 162 discrete intrusion sets, each showing focused and customized deployment strategies. Cybercriminals behind the LapDogs operation exploit long-standing, unpatched security flaws—specifically CVE-2015-1548 and CVE-2017-17663—commonly present in ACME mini_httpd software integrated into SOHO devices manufactured by companies like Ruckus Wireless and Buffalo Technology. These flaws enable silent compromise without user interaction. What sets LapDogs apart from traditional botnets is its precision and quiet persistence. Instead of launching noisy attacks like DDoS, it prioritizes intelligence gathering, data exfiltration, and anonymized web activity routed through infected nodes. Signs of Mandarin language in the code and an emphasis on Taiwanese systems suggest China-linked actors. Given the campaign's evolving tactics and shifting infrastructure, SecurityScorecard emphasizes the need for proactive defense strategies and behavior-based threat modeling to outpace this sophisticated adversary.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...