ViciousTrap Campaign: Over 5,500 Devices Hijacked in Global Honeypot Operation

Listen to this Post

Featured Image

Introduction:

In a chilling new chapter of cyberwarfare, an advanced threat actor known as “ViciousTrap” has silently seized control of thousands of internet-facing devices worldwide. This massive and highly coordinated cyber campaign, uncovered by researchers at SEKOIA.io, isn’t just about stealing data or causing disruptions. Instead, it’s transforming these compromised systems into a vast, covert surveillance network—an unprecedented honeypot grid designed to monitor global network activity and possibly identify new vulnerabilities before anyone else can. This operation reveals not only the evolving nature of cybercrime but also the increasing risk posed by unpatched or outdated hardware.

Digest of the Report:

The ViciousTrap campaign has compromised over 5,500 edge devices from more than 50 major vendors including Cisco, D-Link, Linksys, ASUS, QNAP, and Araknis Networks. These devices range from SOHO routers and SSL VPNs to DVRs and BMC controllers. The attack primarily targets older or unpatched hardware, with initial exploitation focusing on the CVE-2023-20118 vulnerability found in Cisco SOHO routers.

Once access is gained, a malicious script dubbed “NetGhost” is installed. This script reroutes network traffic through attacker-controlled servers, setting up a Man-in-the-Middle (MitM) mechanism. Each device infection is tracked with a unique UUID, and the payload self-destructs post-deployment to evade forensic detection.

The infrastructure supporting this campaign is intricate and categorized into exploitation, notification, and interception layers—all hosted by Shinjiru, a Malaysia-based provider. Researchers found over 1,700 open ports acting as reverse proxies for around 60 different device models. Intriguingly, the threat actor is repurposing old webshells and targeting ASUS routers using the CVE-2021-32030 vulnerability. Over 9,500 ASUS routers show signs of compromise.

Detection strategies include monitoring unique SSL fingerprints, JARM hashes, and TCP characteristics. One notable JARM hash correlates with more than 5,300 hosts across 84 countries. Macao appears to be a hotspot, likely due to its reliance on outdated D-Link hardware.

While there is no confirmed attribution, linguistic and operational patterns suggest the campaign originates from a Chinese-speaking entity—yet there’s no sign that Chinese infrastructure has been affected. The use of this hijacked network points to objectives beyond DDoS or spam—it appears tailored for global reconnaissance and vulnerability harvesting.

What Undercode Say:

The ViciousTrap campaign reflects a strategic shift in the cybercrime landscape. Unlike traditional botnet operations aimed at flooding networks or stealing data, this campaign transforms compromised devices into passive observers of internet traffic. The innovation here lies in how these edge devices—many of them aging and neglected—are turned into a global sensor array.

From a technical perspective, the use of BusyBox binaries and unique payloads like NetGhost demonstrates a deep understanding of embedded Linux environments. The compartmentalization of the infrastructure into layers of exploitation, notification, and interception is a hallmark of a mature, well-funded operation. By using Malaysia-based Shinjiru’s IPs, the attackers cloak their activities in less scrutinized regions of the internet.

The

Furthermore, the JARM fingerprinting and TCP heuristics suggest that ViciousTrap is collecting telemetry to potentially build a real-time map of global internet vulnerabilities. This information could be monetized, weaponized, or both.

Security implications are grave: if these devices form a passive monitoring network, they could detect exploit trends before defenders do. It’s cyber reconnaissance at scale, possibly feeding advanced persistent threat (APT) activities or cyber-espionage campaigns.

ViciousTrap’s evasion of detection via self-deleting scripts and use of non-standard ports for SSH access also implies a long-game strategy—laying low while collecting vast amounts of network intelligence.

This isn’t just a wake-up call for users to update their firmware. It’s a demand for manufacturers to rethink hardware lifecycle policies and patch availability. Devices once deemed “secure enough” are now nodes in an enemy surveillance system.

Lastly, the geographic disparity—extensive compromise outside of China but not within—suggests political motivations or at the very least, strategic exclusion zones. This selective targeting adds weight to suspicions of state-sponsored interests.

Fact Checker Results:

✔ Verified use of CVE-2023-20118 and CVE-2021-32030

✔ Over 5,500 devices confirmed compromised globally 🌍

✔ Attribution aligns with Chinese-speaking threat actors but remains unconfirmed 🕵️

Prediction:

If left unchecked, ViciousTrap could evolve into a dominant intelligence-gathering network, capable of spotting zero-days before they’re disclosed. Expect increased targeting of smart home and IoT devices as attackers seek to expand this surveillance web. Nations and corporations alike must anticipate more sophisticated, stealth-focused cyber campaigns that blur the line between espionage and cybercrime. Mass device updates, hardware recalls, and tighter regulation of consumer-grade routers may soon be on the global cybersecurity agenda.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://www.twitter.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram