Version 138: Over 9,000 Asus routers hijacked by a botnet and enduring SSH backdoor invulnerable to firmware updates

Major Security Breach Targets ASUS Routers: Over 9,000 Devices Compromised

In a troubling revelation for network security, a serious breach has been identified affecting more than 9,000 ASUS routers. Security firm GreyNoise uncovered this incident in March 2025, revealing the infiltration of a sophisticated botnet known as “AyySSHush.”

The attack takes advantage of vulnerabilities in authentication and cleverly employs legitimate functions within the routers to establish a persistent SSH backdoor. What sets this breach apart is the backdoor’s location—it resides in the router’s non-volatile memory (NVRAM), which ensures its survival through firmware updates and system reboots. This permanence means that many conventional remediation strategies are rendered useless, leaving affected users vulnerable to ongoing threats.

The implications of this attack are significant, not only compromising the individual routers but also potentially endangering the broader networks they connect to. As such, users are urged to take precautions, including changing default passwords and considering professional assistance for safeguarding their devices. It is a stark reminder of the importance of robust cybersecurity practices in an increasingly connected world.

Share this content:

One Comment

  1. Thank you for sharing this important security alert. The botnet infiltration of ASUS routers via a persistent SSH backdoor embedded in NVRAM is indeed a serious concern. Since this type of compromise resides in non-volatile memory and survives firmware updates, traditional mitigation steps may not be sufficient.

    Here are some recommended actions you can take:

    • Perform a Factory Reset: Reset your router to its factory settings to remove any configuration changes or malicious scripts. Ensure you back up your legitimate configuration beforehand.
    • Update Firmware: Check if ASUS has released any security patches specifically addressing this vulnerability. Applying the latest firmware can sometimes help but may not eliminate persistent backdoors in NVRAM.
    • Reinstall Firmware with a Clean Image: If possible, flash the router with a clean, unmodified firmware image provided directly by ASUS, ensuring any malware residing in NVRAM is eradicated. Some cases may require using TFTP or serial recovery modes.
    • Disable Remote Management: Turn off WAN/Remote access features to limit potential attack vectors.
    • Change Default and Weak Passwords: Use strong, unique passwords for all administrative accounts.
    • Network Segmentation: Isolate your router

Leave a Reply

Your email address will not be published. Required fields are marked *