• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

AVrecon RAT Campaign Targeting Routers in the United States

July 13, 2023 By Heinrich Long — Leave a Comment
AVrecon RAT Campaign Targeting Routers in the United States

Lumen Black Lotus Labs has discovered an AVrecon RAT (Remote Access Trojan) campaign that has been underway for at least two years, infecting small office and home routers with a botnet payload.

Black Lotus Labs reports that the campaign focuses mainly on the U.S. but has claimed victims globally. Currently, the botnet counts over 70,000 enslaved devices, communicating with 15 unique command and control (C2) servers.

Heatmap of AVrecon victims
Black Lotus Labs

The attackers’ goal appears to be to use the compromised routers to perform advertising fraud, “password spraying” attacks, and data exfiltration. Home routers have a more trustworthy profile thanks to their regular activity and “clean” IP address history, so they can be abused for bypassing security measures and blocks that impact most bot farms and datacenter-provided IPs.

Residential proxies is a growing cybercrime industry that rent network traffic routers to malicious actors, enabling them to perform nefarious tasks at a much better acceptance rate, making malicious traffic appear as if it originates from home or small office computers.

Observed operational diagram
Black Lotus Labs

AVrecon Capabilities

AVrecon spreads to poorly maintained, misconfigured, or neglected routers that are plagued by well-documented vulnerabilities for which there are publicly available exploits. However, Black Lotus Labs has not specified what flaws the campaign targets, so the malware might also compromise devices by brute-forcing weak passwords or using dictionary attacks against weak default credentials.

Once the infection has been established, AVrecon ensures that it is only running a single instance to avoid targeting the same devices and then collects information about the host device, such as the kernel version, CPU, memory usage, hostname, etc.

Next, the malware constructs the parameters for communicating with the C2 servers, configures a proxy, and waits for the reception of commands sent through the spawned reverse shell. The commands include updating its C2 configuration, fetching additional payloads and executing them, downloading an update for the malware, and more.

Commands supported by AVrecon
Black Lotus Labs

Black Lotus monitored AVrecon’s communication exchange from clients to the C2 and discovered that most activity happens in the first couple of days after the infection. The mean lifespan of an AVrecon bot is roughly a week. The analysts explain that this is likely due to the lack of a persistence mechanism on the malware, which terminates it if victims reset their routers. Possibly, the devices are abandoned after being abused for malicious purposes, resulting in them being added to block lists.

How to Defend

Signs of an infected router include connection interruptions, poor network performance, unexplained changes in device settings, DNS changes, and excessive heat. However, those signs may not be as noticeable in subtle attacks that don’t use much of the victim’s available bandwidth.

Users should follow good security practices and apply the available firmware updates for their router model, downloaded from the vendor’s website. Moreover, remote access to admin panels should be closed if not needed, and default admin account credentials should be changed with something unique and long.

Related Articles:

  • How to Secure Your Home Network Against Threats
  • Best VPN Routers Comparison and Easy Setup Instructions
  • New Prometei Botnet Version Infects Devices in 155 Countries
  • CyberGhost VPN for Windows Vulnerable to Command Injection

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP