Version 66: Over 9,000 Asus routers affected by a botnet assault and a stubborn SSH backdoor impervious to firmware updates

Title: Major Security Breach: 9,000 ASUS Routers Targeted by Botnet Attack

In a troubling development for cybersecurity, more than 9,000 ASUS routers have been compromised due to a sophisticated botnet attack identified as “AyySSHush.” This alarming incident was uncovered in March 2025 by cybersecurity experts at GreyNoise, who revealed the attack exploits vulnerabilities in router authentication.

The nature of this breach is concerning; the attackers have ingeniously utilized legitimate features of the routers to create a persistent SSH backdoor. This backdoor is crucially embedded in the router’s non-volatile memory (NVRAM), which means it can withstand firmware updates and system reboots. As a result, conventional methods of addressing such breaches are rendered ineffective, making remediation particularly challenging for affected users.

This incident underscores the importance of maintaining robust cybersecurity measures, particularly for home and small business networking equipment. It serves as a stark reminder for users to regularly update their router firmware and monitor their devices for any unusual activity. In an age where our reliance on technology continues to grow, safeguarding our digital environments is paramount.

Stay vigilant and proactive in protecting your network to mitigate the risks posed by such cyber threats in the future.

Share this content:

One Comment

  1. Thank you for bringing this serious security concern to our attention. The described persistence of the SSH backdoor embedded in the router’s NVRAM indeed poses a significant challenge, as firmware updates often cannot remove such persistent threats.

    In this case, we recommend the following steps:

    • Perform a full factory reset: This can sometimes help, but if the backdoor is deeply embedded in NVRAM, it may not be sufficient.
    • Reboot the router in recovery mode: Some ASUS models allow recovery mode reinstallation, which can overwrite persistent backdoors if supported.
    • Use physical hardware reset options: If your device has a reset button, hold it down for the designated time to perform a hardware reset.
    • Replace affected devices: Since the backdoor resides in NVRAM and survives firmware updates, replacing compromised routers with new hardware is often the most secure solution.

    Additionally, ensure that:

    • Always download firmware updates directly from the official ASUS support website.
    • Monitor network activity for unusual behavior, such as unexpected SSH connections or traffic spikes.
    • Reset device passwords and disable any unnecessary

Leave a Reply

Your email address will not be published. Required fields are marked *