Version 43: Over 9,000 Asus Routers Hacked via Botnet and Steady SSH Backdoor, Unaffected by Firmware Updates

Title: Massive Botnet Attack Compromises 9,000 ASUS Routers: Understanding the AyySSHush Threat

In a concerning development for cybersecurity, over 9,000 ASUS routers have fallen victim to a sophisticated botnet attack identified as “AyySSHush.” This incident came to light in March 2025, following an investigation by GreyNoise, a reputable cybersecurity firm.

The AyySSHush attack exploits critical authentication weaknesses within the router’s design, allowing malicious actors to establish a persistent SSH (Secure Shell) backdoor. What makes this breach particularly alarming is that the backdoor is entrenched in the router’s non-volatile memory (NVRAM). This clever tactic ensures that even when users attempt to safeguard their devices by installing firmware updates or rebooting, the backdoor remains intact and operational.

As cybersecurity professionals delve deeper into this attack, it becomes evident that traditional remediation strategies are inadequate due to the nature of this vulnerability. The inherent challenges posed by NVRAM mean that simply updating firmware will not eliminate the threat, leaving users at significant risk.

This incident serves as a powerful reminder of the evolving landscape of cyber threats and the importance of proactive security measures in our increasingly connected world. Users of ASUS routers are urged to remain vigilant and consider additional protection strategies to mitigate the risk of unauthorized access.

Stay informed, stay secure, and ensure your devices are adequately protected against such evolving risks in the digital age.

Share this content:

One Comment

  1. Important Information Regarding ASUS Router Security and the AyySSHush Threat

    Thank you for sharing this detailed update on the recent security incident involving ASUS routers. The discovery of persistent backdoors stored in NVRAM, as seen with the AyySSHush attack, highlights the increasing complexity of cybersecurity threats targeting network devices.

    Given that firmware updates alone are insufficient to remove this type of backdoor, we recommend the following proactive steps:

    • Perform a Secure Factory Reset: This can help erase some malicious configurations, but be aware that if the backdoor resides permanently in hardware, this method may not fully eliminate the threat.
    • Change Default and Weak Passwords: Use strong, unique passwords for your router admin and Wi-Fi networks to prevent unauthorized access.
    • Implement Network Segmentation: Isolate IoT and other vulnerable devices on separate networks to minimize potential attack vectors.
    • Monitor Network Traffic: Use network monitoring tools to detect suspicious activity that might indicate compromised devices.
    • Stay Updated with Firmware and Security Patches: Although firmware updates may not eliminate NVRAM-resident backdoors, keeping firmware current ensures protection against other vulnerabilities.
    • Consult Manufacturer Support: Contact ASUS support or consult their security advisories for

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *