Stealthy 'Cuttlefish' Malware Hides on Routers to Steal Credentials from Network Traffic

'Cuttlefish' Malware Infects Routers to Spy on Network Traffic and Steal Data

HIGH
March 12, 2026
5m read
MalwareIoT SecurityThreat Intelligence

Related Entities

Other

Cuttlefish

Full Report

Executive Summary

Security researchers have uncovered 'Cuttlefish', a new and highly sophisticated malware strain specifically designed to infect and persist on enterprise-grade and SOHO routers. The malware functions as a passive and stealthy data thief. Once resident on a router, it monitors all traffic that passes through it, looking for authentication credentials and other sensitive information. Cuttlefish can create a private VPN on the compromised router for data exfiltration and can also hijack DNS and HTTP traffic to launch further attacks. Its ability to hide within a core network device and steal data without altering endpoint behavior makes it a particularly insidious threat.


Threat Overview

Cuttlefish represents a significant evolution in router-based malware. Unlike simpler malware that might just add a device to a botnet, Cuttlefish is a full-featured espionage platform. The attack likely begins by exploiting a known vulnerability in the router's firmware or by brute-forcing weak default credentials.

Once it has gained root access on the router, the malware installs itself and takes the following actions:

  1. Establishes Persistence: It modifies the router's startup scripts to ensure it survives a reboot.
  2. Monitors Traffic: It uses filtering rules to passively inspect all network traffic passing through the router.
  3. Credential Theft: It specifically looks for authentication data within protocols like HTTP, FTP, SMTP, and others, exfiltrating usernames and passwords.
  4. Creates a Covert Channel: It can set up its own VPN or proxy on the router, allowing the attacker to discreetly exfiltrate stolen data and issue commands.
  5. Traffic Hijacking: The malware has modules that can perform DNS hijacking (redirecting users to malicious sites) and inject malicious code into HTTP traffic.

Technical Analysis

Cuttlefish is a modular malware framework. The core component is responsible for persistence and loading other modules. Key modules observed include:

  • Packet Sniffer: A component that uses libpcap-like functionality to capture and analyze network packets in real-time.
  • Rule Engine: A configurable engine that allows the attacker to specify what kind of data to look for (e.g., Authorization: Basic headers in HTTP, FTP USER/PASS commands).
  • Exfiltration Module: A module that sends stolen data back to an attacker-controlled command-and-control (C2) server, often over a custom VPN tunnel to evade detection.

MITRE ATT&CK TTPs:

Impact Assessment

The impact of a Cuttlefish infection is severe and multifaceted:

  • Widespread Credential Compromise: The malware can harvest credentials for a multitude of internal and external services, leading to follow-on account takeovers.
  • Loss of Confidentiality: All unencrypted traffic passing through the router is subject to inspection and theft.
  • Platform for Further Attacks: The DNS and HTTP hijacking capabilities allow attackers to serve malware to internal users or redirect them to phishing pages, bypassing other security controls.
  • Difficult to Eradicate: Router malware can be notoriously difficult to detect and remove. A simple reboot may not be sufficient to clear the infection if persistence is established correctly.

Detection & Response

Detecting Cuttlefish is challenging as it resides on a network device, not an endpoint.

  • Firmware Integrity Checks: Compare the hash of the router's current firmware and key system files against known-good versions from the manufacturer.
  • Network Traffic Analysis: Monitor the router's own outbound traffic. Any unexpected connections, especially to unknown IP addresses or over non-standard ports, are highly suspicious. Look for DNS queries to unusual domains from the router itself.
  • Configuration Audits: Regularly audit router configurations for unauthorized changes, such as new firewall rules, DNS forwarders, or VPN settings.
  • Check for Unexpected Services: Scan the router for any unexpected open ports or services that are not part of the standard configuration.

Mitigation

  1. Update Router Firmware: Keep router firmware up-to-date. This is the single most important step to protect against exploitation of known vulnerabilities.
  2. Change Default Credentials: Immediately change the default administrator username and password on all routers and network devices. Use a long, complex, and unique password.
  3. Disable Remote Management: Disable remote (WAN-side) administration of the router. Management should only be possible from the internal LAN.
  4. Network Segmentation: Segmenting the network can help contain the impact, as the router would only be able to sniff traffic within its own segment.

Timeline of Events

1
March 12, 2026
This article was published

MITRE ATT&CK Mitigations

Regularly update router firmware to patch known vulnerabilities that could be used for initial access.

Mapped D3FEND Techniques:

Change default administrator credentials on routers to strong, unique passwords to prevent brute-force attacks.

Mapped D3FEND Techniques:

Disable remote/WAN administration for routers to prevent attackers on the internet from accessing the management interface.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary defense against router malware like Cuttlefish is diligent firmware management. Organizations must incorporate their network devices, including enterprise and SOHO routers, into their regular patch management program. This involves creating an inventory of all router models, subscribing to security advisories from the vendors, and establishing a process to test and deploy firmware updates in a timely manner. Since many initial access attacks against routers exploit publicly known vulnerabilities, keeping firmware up-to-date is the most effective way to close the door on these threats. For critical devices, automated checks for new firmware versions should be implemented.

To detect and block Cuttlefish's command-and-control (C2) and data exfiltration activities, security teams should monitor traffic originating from the routers themselves. A router's job is to forward traffic, not to initiate its own sessions to arbitrary internet IPs. Configure a next-generation firewall or network monitoring solution to baseline the normal outbound traffic from your routers (e.g., to NTP servers, vendor update sites). Then, create a strict outbound filtering policy that denies all other initiated connections by default. An alert on a blocked connection attempt from a router is a high-fidelity indicator that the device may be compromised and is trying to 'phone home'.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CuttlefishMalwareRouterIoT SecurityNetwork SniffingCredential Theft

📢 Share This Article

Help others stay informed about cybersecurity threats