Hackers have recently taken advantage of a zero-day vulnerability in Cambium Networks' cnPilot routers, deploying a variant of the AISURU botnet known as AIRASHI to execute distributed denial-of-service (DDoS) attacks. This exploitation has been ongoing since June 2024, raising significant concerns about the security of IoT devices.

Key Takeaways
Zero-Day Vulnerability: An unspecified flaw in cnPilot routers is being exploited.
AIRASHI Botnet: A variant of the AISURU botnet is being used for DDoS attacks.
Global Impact: Compromised devices are primarily located in Brazil, Russia, Vietnam, and Indonesia.
Attack Capacity: The AIRASHI botnet can sustain attack capacities between 1-3 Tbps.
Overview of the Exploit
The cybersecurity firm QiAnXin XLab reported that hackers have been leveraging this zero-day vulnerability to deploy AIRASHI, a botnet variant that has been active since mid-2024. The specific details of the vulnerability remain undisclosed to prevent further exploitation.
Botnet Characteristics
AIRASHI is a sophisticated botnet that has evolved from the AISURU botnet, which was previously linked to a DDoS attack on the gaming platform Steam. The AIRASHI botnet has been observed to incorporate proxyware functionality, indicating a potential shift in the threat actors' strategy to expand their malicious services.
Variants of AIRASHI
AIRASHI-DDoS: Focuses primarily on DDoS attacks while allowing arbitrary command execution and reverse shell access.
AIRASHI-Proxy: A modified version that includes proxy functionality, enhancing its capabilities.
Geographic Distribution of Attacks
The compromised devices are predominantly located in:
Brazil
Russia
Vietnam
Indonesia
The primary targets of these attacks include countries such as China, the United States, Poland, and Russia, highlighting the global reach of this cyber threat.
Technical Details of AIRASHI
The AIRASHI botnet employs advanced communication protocols, utilizing HMAC-SHA256 and CHACHA20 algorithms. It supports multiple message types, with AIRASHI-DDoS accommodating 13 message types and AIRASHI-Proxy supporting five.
Implications for IoT Security
This incident underscores the ongoing vulnerabilities present in IoT devices, which are increasingly being exploited as vectors for launching powerful DDoS attacks. The findings from QiAnXin XLab emphasize the need for enhanced security measures in the IoT landscape to mitigate such risks.
As cyber threats continue to evolve, the exploitation of zero-day vulnerabilities in widely used devices like cnPilot routers serves as a stark reminder of the importance of robust cybersecurity practices. Organizations must remain vigilant and proactive in securing their networks against such emerging threats.
Cybersecurity has never been more critical. At BetterWorld Technology, we empower businesses with advanced solutions to combat emerging threats while driving innovation. Protect your organization with confidence—contact us today to schedule a consultation and secure your company’s future.
Sources
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet, The Hacker News.