Major Cybersecurity Breach: Over 9,000 Asus Routers Compromised by Persistent Botnet Attack
In a troubling development for network security, cybersecurity researchers have uncovered a severe breach affecting more than 9,000 Asus routers. The attack, identified as the handiwork of a sophisticated botnet named “AyySSHush,” was first reported by GreyNoise in March 2025.
This incident highlights significant vulnerabilities within router authentication processes. The botnet takes advantage of legitimate features built into the routers to create a persistent SSH backdoor, a breach that proves remarkably resilient against conventional protective measures.
One of the most alarming aspects of this attack is the method by which the backdoor has been implanted. It resides within the router’s non-volatile memory (NVRAM), which means it can withstand firmware updates and device reboots. As a result, attempts to secure the devices through a simple software update are ineffective, leaving users exposed to potential exploitation.
Network administrators and Asus router users alike must remain vigilant in the face of this security threat. Without effective remedies, many devices may continue to operate under the influence of this malicious software, highlighting the need for heightened awareness and advanced security measures in managing network devices.
This incident serves as a reminder of the critical importance of robust cybersecurity practices, particularly as more devices connect to the internet. It underscores the urgent necessity for users to regularly monitor and secure their networks against evolving threats.
Share this content:
Thank you for sharing this important security update. The persistence of the SSH backdoor residing in NVRAM indeed poses significant challenges for device remediation through firmware updates alone. In cases like this, it’s recommended to consider the following steps:
It’s crucial to stay updated with official security advisories from Asus and cybersecurity communities. Implementing layered security measures, such as network segmentation and strict access controls, will also enhance your defenses against persistent