Security researchers have uncovered 'Cuttlefish', a new and highly sophisticated malware strain specifically designed to infect and persist on enterprise-grade and SOHO routers. The malware functions as a passive and stealthy data thief. Once resident on a router, it monitors all traffic that passes through it, looking for authentication credentials and other sensitive information. Cuttlefish can create a private VPN on the compromised router for data exfiltration and can also hijack DNS and HTTP traffic to launch further attacks. Its ability to hide within a core network device and steal data without altering endpoint behavior makes it a particularly insidious threat.
Cuttlefish represents a significant evolution in router-based malware. Unlike simpler malware that might just add a device to a botnet, Cuttlefish is a full-featured espionage platform. The attack likely begins by exploiting a known vulnerability in the router's firmware or by brute-forcing weak default credentials.
Once it has gained root access on the router, the malware installs itself and takes the following actions:
Cuttlefish is a modular malware framework. The core component is responsible for persistence and loading other modules. Key modules observed include:
libpcap-like functionality to capture and analyze network packets in real-time.Authorization: Basic headers in HTTP, FTP USER/PASS commands).T1189 - Drive-by Compromise or T1190 - Exploit Public-Facing Application: Likely initial access vectors targeting the router's web interface.T1040 - Network Sniffing: The primary data collection method.T1557 - Adversary-in-the-Middle: The DNS and HTTP hijacking capabilities fall under this tactic.T1071.004 - Application Layer Protocol: DNS: Used for C2 communication and DNS hijacking.T1567 - Exfiltration Over Web Service: Exfiltrating stolen credentials to the C2 server.The impact of a Cuttlefish infection is severe and multifaceted:
Detecting Cuttlefish is challenging as it resides on a network device, not an endpoint.
D3-SU: Software Update for firmware. Enforce D3-SPP: Strong Password Policy for device administration. Use D3-OTF: Outbound Traffic Filtering on the router's own traffic to block C2 communication.Regularly update router firmware to patch known vulnerabilities that could be used for initial access.
Mapped D3FEND Techniques:
Change default administrator credentials on routers to strong, unique passwords to prevent brute-force attacks.
Mapped D3FEND Techniques:
Disable remote/WAN administration for routers to prevent attackers on the internet from accessing the management interface.
Mapped D3FEND Techniques:
The primary defense against router malware like Cuttlefish is diligent firmware management. Organizations must incorporate their network devices, including enterprise and SOHO routers, into their regular patch management program. This involves creating an inventory of all router models, subscribing to security advisories from the vendors, and establishing a process to test and deploy firmware updates in a timely manner. Since many initial access attacks against routers exploit publicly known vulnerabilities, keeping firmware up-to-date is the most effective way to close the door on these threats. For critical devices, automated checks for new firmware versions should be implemented.
To detect and block Cuttlefish's command-and-control (C2) and data exfiltration activities, security teams should monitor traffic originating from the routers themselves. A router's job is to forward traffic, not to initiate its own sessions to arbitrary internet IPs. Configure a next-generation firewall or network monitoring solution to baseline the normal outbound traffic from your routers (e.g., to NTP servers, vendor update sites). Then, create a strict outbound filtering policy that denies all other initiated connections by default. An alert on a blocked connection attempt from a router is a high-fidelity indicator that the device may be compromised and is trying to 'phone home'.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats