What's new

Suspicious Outgoing traffic on RT-AC86U

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

arturk

New Around Here
Hello everyone, I am new here and looking for some help with my RT-AC86U.

Over the last few days I started experiencing frequent internet connectivity interruptions: video audio streams interrupted, unable to refresh web page.
I setup continuous ping -t google.com and this quickly revealed every few minutes connection was being dropped for few seconds.
Next I logged into router UI to see if I could find out more.
When I noticed that at the same time ping packets dropped, CPU utilization on router would go crazy (from few percent to 80%+).
HighCPU.png

Switching to "Traffic Analyzer" revealed huge bursts of outbound traffic which collated exactly with high CPU and dropped ping packages.
OutboundBursts.png

This chart shows history for last 10 minutes. You can see over 2GB of data being sent during this time, it is absolutely crazy.

I started looking for source of this traffic within my networks. I have close to 40 devices (Windows Laptops and Servers, NAS, Security Cameras, IOT, ....).
I could not find any device ending data using router build in tools like "QoS Bandwidth Monitor" or Wireshark.

Meanwhile gigabytes of data were being sent.
24HoursHistory.jpg

You can see over 62GB reported in around 4 hours span.

I decided to disconnect everything from the router.
With only 1 cellphone connected to the router GUI to be able to see Traffic Monitor nothing changed, outbound traffic still present and unchanged.
In few hour of troubleshooting I could find nothing.

None of this outbound traffic is registered but router's Bandwidth Monitor.
In QoS I limited "Upload Bandwidth" to 5Mb/s and while this restricted bandwidth on the phone it did nothing to slow down suspicious bursts of outbound traffic from the router. When I initiate traffic from cellphone (or other device) traffic is properly indicated by QoS Bandwidth Monitor.
At this point I came to conclusion that whatever it is, router itself must be doing it. I know it sounds crazy, how can router generate this much of outgoing traffic?

After few ours outbound traffic stopped on its own. It was fine for about two days and this morning it returned. it is not as severe as before, down to average 600MB per 10 minutes from over 2GB but still bad.
I do not think it is happening constantly 24 hours a day but at least for few hours and I do not see any obvious pattern.

I am completely lost and looking for some ideas.
Sorry about the long post but I was trying to be as descriptive as possible. If I missed something please let me know.

Here is some more details about router and settings.
2021 ASUS RT-AC86U with appropriate latest Merlin Firmware 386.14.
I have all Port Forwarding disabled.
Web Access from WAN is also disabled.
 
Sounds like malware. See this thread.
 
Sounds like malware. See this thread.
Hi Dave, thanks a lot for such quick response!
It definitely looks like my problem.
I started reading the thread and going through recommended troubleshooting steps.

So far I identified {sshd} is involved by looking at the TOP while outbound traffic was taking place.
TOP.png


But "find / -name sshd" does not return anything.

I will keep looking...
 
Please run ls -altr /tmp/ while the problem is happening and post all the output.

Can you also confirm whether you have AiCloud 2.0 enabled.
 
@arturk do you have AiCloud and/or WAN access to router's UI interface enabled?
386.14 includes lighttpd 1.4.39 that is CVE-2024-3094 vulnerable.
 
Last edited:
What do the braces indicate?
The program has changed the process name to be different than the binary name. I don’t know all the details of how it works, but shows how the malware is trying to hide its tracks.

Most of the sleuthing was done in the other thread. The sshd processes are links to an unauthorized binary in /tmp.
 
Is that because of the braces around the name in the top output? (need to use "{sshd}"?)
No.

What do the braces indicate?
It indicates that it's a thread rather than a process and from the other information we can see the original process has terminated leaving the first one of these as an orphan. Periodically it will spawn two more copies of itself, one of which starts listening on a random UDP port.

386.14 includes lighttpd 1.4.39 that is CVE-2024-3094 vulnerable.
I don't think that is applicable. They are saying don't compile lighttpd using the compromised xz 5.6.0 source code (CVE-2024-3094). The router does doesn't use that version.
 
Last edited:
I don't think that is applicable. They are saying don't compile lighttpd using the compromised xz 5.6.0 source code (CVE-2024-3094). The router does use that version.
Maybe it is not. However, I started having the very same problem some time ago and CVE-2024-3094 timing seemed relevant to me.
Bash:
Sep 23 20:08:19 GT-AC2900-1 kernel: lighttpd[1507]: unhandled level 3 translation fault (11) at 0x00000000, esr 0x92000007
Sep 23 20:08:19 GT-AC2900-1 kernel: pgd = ffffffc03196d000
Sep 23 20:08:19 GT-AC2900-1 kernel: [00000000] *pgd=000000003192b003, *pud=000000003192b003, *pmd=00000000318c6003, *pte=0000000000000000
Sep 23 20:08:19 GT-AC2900-1 kernel: CPU: 1 PID: 1507 Comm: lighttpd Tainted: P           O    4.1.27 #2
Sep 23 20:08:19 GT-AC2900-1 kernel: Hardware name: Broadcom-v8A (DT)
Sep 23 20:08:19 GT-AC2900-1 kernel: task: ffffffc03416f540 ti: ffffffc031960000 task.ti: ffffffc031960000
Sep 23 20:08:19 GT-AC2900-1 kernel: PC is at 0xf66ebf4c
Sep 23 20:08:19 GT-AC2900-1 kernel: LR is at 0xf66ebf44
Sep 23 20:08:19 GT-AC2900-1 kernel: pc : [<00000000f66ebf4c>] lr : [<00000000f66ebf44>] pstate: 600f0010
Sep 23 20:08:19 GT-AC2900-1 kernel: sp : 00000000ffa46cf8
Sep 23 20:08:19 GT-AC2900-1 kernel: x12: 00000000f6703354
Sep 23 20:08:19 GT-AC2900-1 kernel: x11: 000000000001cc98 x10: 00000000007eee78
Sep 23 20:08:19 GT-AC2900-1 kernel: x9 : 00000000ffffffff x8 : 0000000000000041
Sep 23 20:08:19 GT-AC2900-1 kernel: x7 : 0000000000000000 x6 : 00000000f66ef5bc
Sep 23 20:08:19 GT-AC2900-1 kernel: x5 : 0000000000878208 x4 : 00000000008e45f0
Sep 23 20:08:19 GT-AC2900-1 kernel: x3 : 00000000008d60d8 x2 : 000000000089ffe8
Sep 23 20:08:19 GT-AC2900-1 kernel: x1 : 000000000000000a x0 : 0000000000000000
Sep 23 20:08:19 GT-AC2900-1 kernel: potentially unexpected fatal signal 11.
Sep 23 20:08:19 GT-AC2900-1 kernel: CPU: 1 PID: 1507 Comm: lighttpd Tainted: P           O    4.1.27 #2
Sep 23 20:08:19 GT-AC2900-1 kernel: Hardware name: Broadcom-v8A (DT)
Sep 23 20:08:19 GT-AC2900-1 kernel: task: ffffffc03416f540 ti: ffffffc031960000 task.ti: ffffffc031960000
Sep 23 20:08:19 GT-AC2900-1 kernel: PC is at 0xf66ebf4c
Sep 23 20:08:19 GT-AC2900-1 kernel: LR is at 0xf66ebf44
Sep 23 20:08:19 GT-AC2900-1 kernel: pc : [<00000000f66ebf4c>] lr : [<00000000f66ebf44>] pstate: 600f0010
Sep 23 20:08:19 GT-AC2900-1 kernel: sp : 00000000ffa46cf8
Sep 23 20:08:19 GT-AC2900-1 kernel: x12: 00000000f6703354
Sep 23 20:08:19 GT-AC2900-1 kernel: x11: 000000000001cc98 x10: 00000000007eee78
Sep 23 20:08:19 GT-AC2900-1 kernel: x9 : 00000000ffffffff x8 : 0000000000000041
Sep 23 20:08:19 GT-AC2900-1 kernel: x7 : 0000000000000000 x6 : 00000000f66ef5bc
Sep 23 20:08:19 GT-AC2900-1 kernel: x5 : 0000000000878208 x4 : 00000000008e45f0
Sep 23 20:08:19 GT-AC2900-1 kernel: x3 : 00000000008d60d8 x2 : 000000000089ffe8
Sep 23 20:08:19 GT-AC2900-1 kernel: x1 : 000000000000000a x0 : 0000000000000000
I upgraded to 384.14 from 384.12 but the problem persisted.
As soon as I closed all lighttpd external ports the problem stopped.
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top