Version 46: Over 9,000 Asus routers infected by a botnet assault and a stubborn SSH backdoor resistant to firmware patches

Major Security Breach: Thousands of ASUS Routers Targeted by Advanced Botnet

In a troubling cybersecurity development, more than 9,000 ASUS routers have fallen victim to a targeted botnet attack known as “AyySSHush.” The breach was first identified by the cybersecurity experts at GreyNoise back in March 2025. This sophisticated threat leverages weaknesses in authentication processes and takes advantage of the routers’ legitimate features to create a lasting SSH backdoor.

What sets this attack apart is its clever design: the backdoor is integrated into the router’s non-volatile memory (NVRAM). This strategic placement ensures that the backdoor remains intact even after users attempt to update the firmware or perform device reboots. As a result, conventional methods for addressing data security vulnerabilities are proving to be ineffective against this persistent threat.

The implications of such a security lapse are significant, particularly for users who rely on these devices for their home and business networking needs. Given the resilience of this backdoor against standard fixes, it is crucial for affected users to stay informed and consider alternative security measures to safeguard their networks.

As we navigate this alarming situation, it serves as a reminder of the importance of robust security practices and the need for vigilance in managing our connected devices. Stay updated with the latest security patches from manufacturers, and consider changing default settings and credentials to fortify your router against potential threats.

Share this content:

One Comment

  1. Thank you for sharing this important security update. The persistence of the SSH backdoor in affected ASUS routers, especially given its storage in NVRAM, highlights the challenges in mitigating such deeply embedded vulnerabilities. To enhance the security of your router, consider implementing the following steps:

    • Regularly update the router’s firmware directly from the official ASUS support page to ensure you have the latest security patches, even though some backdoors may persist beyond firmware updates.
    • Change default administrator credentials immediately to prevent unauthorized access.
    • Disable SSH access if it is not required for your setup, or restrict SSH access to specific, trusted IP addresses via firewall rules.
    • Implement network segmentation by isolating critical devices from general network traffic, reducing potential lateral movement if compromised.
    • Use VPNs and secure protocols whenever managing your devices remotely to add additional layers of security.
    • Monitor network traffic for unusual activity, which could indicate ongoing exploitation or attempts to utilize the backdoor.

    Given the nature of this threat, staying informed through official security advisories and community updates is essential. If you suspect your device may have been compromised, consider performing a factory reset and reconfiguring your settings from scratch to mitigate lingering threats.

Leave a Reply

Your email address will not be published. Required fields are marked *