Version 48: “Botnet Assault Exploits Persistent SSH Backdoor to Compromise 9,000 Asus Routers Beyond Firmware Fixes”

Cybersecurity Alert: Over 9,000 ASUS Routers Compromised by Persistent Botnet Attack

In an alarming revelation, a critical cybersecurity breach has impacted more than 9,000 ASUS routers, thanks to a sophisticated botnet known as “AyySSHush.” This disturbing development was unveiled in March 2025 by cybersecurity experts at GreyNoise, who reported that the attack takes advantage of authentication weaknesses in these devices.

The mechanism behind this intrusion is particularly notable; the perpetrators have exploited legitimate features of the routers to install a persistent SSH backdoor. This backdoor is cleverly embedded in the router’s non-volatile memory (NVRAM), allowing it to persist even through firmware updates and device restarts. As a result, conventional methods for remediation are proving ineffective, leaving many users at risk.

The implications of this breach are significant. Not only are the compromised routers vulnerable to further exploitation, but the resilience of the backdoor complicates efforts to restore device security. Users are urged to remain vigilant, monitor their devices closely, and consider additional security measures to safeguard their networks.

As the situation evolves, it is imperative for ASUS users to stay informed about updates from the company and cybersecurity professionals. This incident serves as a stark reminder of the importance of robust security practices and the need for constant vigilance in the ever-evolving landscape of cyber threats.

Share this content:

One Comment

  1. Thank you for sharing this important cybersecurity alert. When dealing with persistent backdoors embedded in router NVRAM, it is crucial to consider comprehensive remediation strategies beyond standard firmware updates.

    • Reset the Router to Factory Defaults: Perform a full reset using the physical reset button while the device is powered on. Hold the button for at least 10-15 seconds, which can help clear some security configurations. However, note that if the backdoor is stored in persistent memory, this alone may not eliminate it.
    • Secure the Device: After resetting, change all default passwords immediately and disable unused services like SSH if unnecessary.
    • Reconfigure SSH and Other Remote Access: Limit SSH access to trusted IP addresses, disable remote SSH access when not needed, and ensure you are running the latest firmware version that includes security patches targeting this vulnerability.
    • Advanced Measures: For thorough removal, consider accessing the router’s recovery mode or using diagnostic firmware tools provided by ASUS or third-party specialists. In some cases, contacting ASUS support for guidance or hardware replacement may be necessary, especially if the backdoor is deeply embedded.

    Additionally, monitor network traffic for unusual

Leave a Reply

Your email address will not be published. Required fields are marked *