- Shortleash gives stealthy computer pirates at the root level and combines malicious activity with everyday net traffic
- Lapdogs uses false LAPD certificates to disguise malware, even avoiding the best final point protection systems
- Malware silently kidnaps the routers and devices that often do not overlap for months
A recently revealed operation of cyber spying, called Lapdogs, has drawn scrutiny after the revelations of the Securityscorec attack team.
The operation, which is believed to be carried out by threat actors aligned in China, has been silently infiltrated in more than 1,000 devices in the United States, Japan, South Korea, Taiwan and Hong Kong.
What makes this campaign distinctive is its use of soho kidnapped routines and IoT hardware, transforming them into operational retransmission boxes (ORB) for sustained surveillance.
Stealth, persistence and false identities
Lapdogs is an ongoing campaign, active since September 2023, aimed at the real estate, medium, municipal and IT sectors.
According to reports, suppliers known as Buffalo Technology and Ruckus Wireless have been compromised.
The attackers use a personalized back door called Shortleash, which grants extensive privileges and stealth, allowing them to mix with legitimate traffic.
According to the report, once a device is infected, it can happen without being detected for months, and in the worst scenarios, some are used as link doors to infiltrate internal networks.
Unlike typical botnets that prioritize interruption or spam, Lapdogs reveals a more surgical approach.
“Lapdogs reflects a strategic change in how cyber threat actors are taking advantage of low visibility distributed devices to obtain persistent access,” said Ryan Sherstobitoff, director of intelligence of securityscorec threats.
“These are not opportunistic attacks for crushing and acceleration: these are deliberate and geographical campaigns that erode the value of traditional IOC (compromise indicators).”
With 162 sets of different intruders already mapped, the structure of the operation suggests a clear intention and segmentation.
What is especially disturbing is the impersonation of legitimate security credentials.
Malware manufactures TLS certificates that seem to be signed by the Los Angeles Police Department.
This falsification, combined with the issuance of the geolocation certificate and the assigned ports, makes it extremely difficult for conventional detection systems mark the malicious behavior.
Even the best protection tools of the end point would be challenged in detecting such well worn intrusions, especially when the activity is encreated through compromised housing routers instead of business assets.
Securityscorecard Compare Lapdogs with Polaredge, another orb system linked to China, but emphasizes that the two are different in infrastructure and execution.
The broader concern raised is the expanding vulnerability panorama. As companies trust decentralized devices and do not update integrated firmware, increase the risk of persistent espionage.
The report calls for the defenders of the Network and ISP to review the devices in their supply chains.
Securityscorecard Compare Lapdogs with Polaredge, another orb system linked to China, but emphasizes that the two are different in infrastructure and execution.
The broader concern raised is the expanding vulnerability panorama. As companies trust decentralized devices and do not update integrated firmware, increase the risk of persistent espionage.
The report calls for the defenders of the Network and ISP to review the devices in their supply chains.
This means that it is necessary to reconsider reactive solutions and focus on more proactive infrastructure levels, such as the best ZTNA solution implementations and the best ZTNA solutions.