Version 76: Over 9,000 Asus routers fall victim to a botnet assault and a stubborn SSH backdoor that remains unremedied despite firmware updates

Major Cybersecurity Breach: Over 9,000 ASUS Routers Compromised by Persistent Botnet Attack

In a troubling development in the realm of cybersecurity, more than 9,000 ASUS routers have fallen prey to a sophisticated botnet operation named “AyySSHush.” This alarming breach, identified by the cybersecurity experts at GreyNoise in March 2025, highlights the vulnerabilities in router authentication protocols and employs legitimate device features to create a persistent SSH backdoor.

The attack has raised significant concerns, notably because the backdoor is cleverly embedded in the router’s non-volatile memory (NVRAM). This strategic positioning allows the malicious code to withstand not only standard firmware updates but also routine device reboots. As a result, conventional methods for rectifying such vulnerabilities may be inadequate or entirely ineffective.

This incident underlines the pressing need for enhanced security measures in consumer-grade routers. Users must remain vigilant and take proactive steps to safeguard their devices against potential threats. We recommend that all ASUS router owners review their security settings, keep their firmware up to date, and consider additional protective measures to bolster their network security.

As we continue to navigate the complexities of digital security, this breach serves as a stark reminder of the vulnerabilities present in our connected devices and the ever-evolving tactics employed by cybercriminals.

Share this content:

One Comment

  1. Understanding the Persistent Backdoor in ASUS Routers

    Thank you for bringing this critical issue to our attention. The presence of a stubborn SSH backdoor embedded in NVRAM, as described, poses significant challenges in mitigation, since firmware updates often do not impact this persistent threat.

    To address this, we recommend the following steps:

    • Perform a Full Factory Reset: This can sometimes remove malicious configurations stored in NVRAM. Ensure you back up your current settings beforehand.
    • Reinstall the Firmware: Download the latest firmware directly from ASUS’s official support site, and perform a manual firmware flash through the router’s recovery mode. This process might help overwrite compromised sections in NVRAM.
    • Use Custom Firmware (Advanced): For tech-savvy users, installing custom firmware such as OpenWRT or AsusWRT-Merlin may provide enhanced security options and greater control over persistent threats. However, this approach requires careful steps and compatibility verification.
    • Isolate the Network: Consider creating a separate VLAN or network segment to shield critical devices from potentially compromised routers.
    • Regular Monitoring: Keep an eye on network traffic for unusual activity, and periodically

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *