Version 37: Over 9,000 Asus routers exploited via botnet infiltration and an enduring SSH vulnerability unremedied by firmware updates

Thinkpad Laptop

Major Cybersecurity Breach: Over 9,000 ASUS Routers Compromised by Persistent Botnet Attack

In a startling revelation, a significant cybersecurity breach has impacted more than 9,000 ASUS routers, with a sophisticated botnet identified as “AyySSHush” at the center of the incident. Initially uncovered by cybersecurity experts at GreyNoise in March 2025, this attack highlights alarming vulnerabilities within router authentication processes.

The AyySSHush botnet takes advantage of fundamental features inherent in routers, effectively establishing a persistent SSH backdoor. What makes this breach particularly concerning is that the backdoor is intricately integrated into the router’s non-volatile memory (NVRAM). This crucial detail means that even when users attempt to execute firmware updates or perform device reboots, the exploit remains intact, sidestepping conventional security measures.

This incident underscores the urgent need for enhanced security protocols and vigilance among consumers. As hackers continue to evolve their techniques, users must remain informed about potential threats to safeguard their networks. Regularly monitoring device settings and staying updated on cybersecurity best practices can help mitigate the risks of such persistent attacks.

In light of this discovery, it is crucial for ASUS router users to assess their current security configurations and consider additional protective measures to secure their devices against future threats.

Share this content:

One Comment

  1. Thank you for sharing this important information. The breach involving ASUS routers and the persistent AyySSHush botnet highlights several critical security concerns. If you’re affected, consider the following steps:

    • Verify your router firmware: Ensure you’re running the latest firmware version directly provided by ASUS. Sometimes, firmware updates may not address deeply embedded vulnerabilities if the manufacturer hasn’t released a patched version yet.
    • Reset your router to factory settings: Perform a factory reset to remove any persistent backdoors or malware that may reside in non-volatile memory. Remember, if the backdoor is embedded in NVRAM, re-flashing firmware alone might not suffice.
    • Change default credentials: Always update default administrator passwords to strong, unique ones to prevent unauthorized access.
    • Disable unnecessary services: Turn off SSH, Telnet, or other remote management features if they’re not needed, reducing attack surface.
    • Implement network segmentation: Isolate IoT and guest devices from critical parts of your network to limit potential damage.
    • Monitor network activity: Use network monitoring tools to detect unusual connections or data flows indicative of compromise.

    If you suspect your device is compromised beyond simple resets, consider consulting a security professional or contacting ASUS support for

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *