Version 99: Over 9,000 Asus routers fall prey to a botnet assault and a stubborn SSH backdoor that withstands all firmware updates

A Serious Cybersecurity Threat: Over 9,000 ASUS Routers Compromised

In a startling discovery, the cybersecurity firm GreyNoise has unveiled a significant breach impacting more than 9,000 ASUS routers. This incident revolves around a sophisticated botnet identified as “AyySSHush,” which takes advantage of vulnerabilities in router authentication protocols.

The issue first came to light in March 2025. This attack utilizes legitimate features of the router infrastructure to create a persistent SSH backdoor. What makes this situation particularly alarming is that the backdoor is embedded within the router’s non-volatile memory (NVRAM). As a result, it remains intact even after firmware updates or device reboots, effectively circumventing traditional attempts at remediation.

The implications of this breach are profound, highlighting serious risks for both individual users and larger networks. While software patches and firmware updates are critical for maintaining device security, the presence of a signature backdoor like this one makes even those measures futile. This incident underscores the importance of vigilance in network management and the need for advanced security practices to protect against evolving threats.

Given the complexities of modern cybersecurity, users are urged to take proactive measures, such as changing default passwords, disabling unnecessary services, and monitoring network activity for suspicious behavior. Staying informed and prepared is the best defense against such formidable threats in today’s interconnected landscape.

Share this content:

One Comment

  1. Thank you for sharing this detailed report. The presence of persistent backdoors embedded in NVRAM is a serious cybersecurity concern, especially when firmware updates do not eliminate the threat. To mitigate such vulnerabilities, consider implementing the following best practices:

    • Perform a thorough device reset: Use the factory reset option to restore the router to default settings, which can sometimes remove configuration-based backdoors—not the ones embedded in NVRAM, but it’s a good first step.
    • Reflash the firmware with a clean image: Download the firmware directly from ASUS’s official website and perform a manual reinstallation via TFTP or SSH, ensuring you’re installing a genuine, unmodified version.
    • Replace affected devices: Given that the backdoor persists in NVRAM, consider replacing compromised units with devices from vendors with robust hardware security measures and clearer vulnerabilities disclosures.
    • Monitor network traffic: Use network security tools to detect unusual SSH activity or outbound traffic indicating compromised devices.
    • Implement network segmentation: Isolate critical systems from the rest of the network to limit potential lateral movement by attackers.

    Always ensure that SSH access is secured with strong, unique passwords and consider disabling SSH if it’s not essential for your environment. Maintaining regular security audits and staying updated with official advisories can also help

Leave a Reply

Your email address will not be published. Required fields are marked *