asus routers compromised secretly

Nearly 9,000 ASUS routers got hacked, and here’s the kicker—rebooting won’t fix them. Neither will firmware updates. These routers are basically zombies now, controlled by threat actors who discovered how to create what security experts call “malware-free backdoors.” Yeah, that’s a thing now.

The whole mess started back in March 2025 when GreyNoise’s AI tool picked up something weird. Their Sift system spotted routers doing stuff they shouldn’t, like granting SSH access through TCP port 53282. Not exactly standard router behavior. By May 27, the confirmed count hit nearly 9,000 compromised devices, and researchers coordinated with government officials before going public on May 28.

Here’s where it gets technical, but stay with me. The attackers didn’t use traditional malware. Instead, they exploited legitimate router features and existing vulnerabilities—HTTP response splitting, Samba bugs, open redirect flaws, and token authentication issues. The vulnerability carries an 8.8 severity score, making it a critical threat to network security. ASUS patched these vulnerabilities, sure. But the damage was already done. Once the backdoor’s in, it’s staying put. The attackers store their backdoor configuration in NVRAM, ensuring it survives reboots and updates.

Security firm Sekoia.io named this nightmare “ViciousTrap,” part of a broader campaign that’s also targeting Cisco and other SOHO routers. They’re calling the botnet behind it “AyySSHush,” which honestly sounds like something a teenager would name their gaming clan. But there’s nothing amateur about these attacks. These are sophisticated threat actors building infrastructure for something bigger.

The really unsettling part? Nobody knows what they’re planning. These compromised routers could become weapons for coordinated attacks. DDoS campaigns, data theft, who knows. Sekoia.io confirmed these aren’t honeypots—they’re real devices in real networks, silently waiting for orders.

Traditional fixes won’t cut it. Firmware updates? Useless. Reboots? Pointless. The only solution is a complete factory reset, and even then, you’d better change those default credentials immediately. ASUS released security advisories, but for those 9,000 routers, it’s too late.

Censys keeps mapping affected devices, GreyNoise continues monitoring, and security teams worldwide are scrambling. Meanwhile, these invisible backdoors persist, turning home routers into sleeper agents. The campaign’s still active, still spreading. And somewhere, threat actors are probably laughing at how easy this was.

References

You May Also Like

The AI Fake ID Crisis: Are We Blaming the Wrong Culprits?

While AI creates perfect fake IDs for pennies, stubborn institutions cling to obsolete security. The real fraud culprits might surprise you.

16 Billion Login Credentials Exposed: Your Digital Identity Is Now at Risk

Your digital identity is worth more than your bank account—and hackers already have 16 billion login credentials ready to exploit.

AI Illusions: Can You Trust What You See in a World of $500,000 Deepfake Frauds?

AI-generated illusions are costing businesses $25M+ per scam while 80% remain defenseless. Can you actually spot a deepfake? Your financial security depends on it.