asus routers compromised secretly

Nearly 9,000 ASUS routers got hacked, and here’s the kicker—rebooting won’t fix them. Neither will firmware updates. These routers are basically zombies now, controlled by threat actors who discovered how to create what security experts call “malware-free backdoors.” Yeah, that’s a thing now.

The whole mess started back in March 2025 when GreyNoise’s AI tool picked up something weird. Their Sift system spotted routers doing stuff they shouldn’t, like granting SSH access through TCP port 53282. Not exactly standard router behavior. By May 27, the confirmed count hit nearly 9,000 compromised devices, and researchers coordinated with government officials before going public on May 28.

Here’s where it gets technical, but stay with me. The attackers didn’t use traditional malware. Instead, they exploited legitimate router features and existing vulnerabilities—HTTP response splitting, Samba bugs, open redirect flaws, and token authentication issues. The vulnerability carries an 8.8 severity score, making it a critical threat to network security. ASUS patched these vulnerabilities, sure. But the damage was already done. Once the backdoor’s in, it’s staying put. The attackers store their backdoor configuration in NVRAM, ensuring it survives reboots and updates.

Security firm Sekoia.io named this nightmare “ViciousTrap,” part of a broader campaign that’s also targeting Cisco and other SOHO routers. They’re calling the botnet behind it “AyySSHush,” which honestly sounds like something a teenager would name their gaming clan. But there’s nothing amateur about these attacks. These are sophisticated threat actors building infrastructure for something bigger.

The really unsettling part? Nobody knows what they’re planning. These compromised routers could become weapons for coordinated attacks. DDoS campaigns, data theft, who knows. Sekoia.io confirmed these aren’t honeypots—they’re real devices in real networks, silently waiting for orders.

Traditional fixes won’t cut it. Firmware updates? Useless. Reboots? Pointless. The only solution is a complete factory reset, and even then, you’d better change those default credentials immediately. ASUS released security advisories, but for those 9,000 routers, it’s too late.

Censys keeps mapping affected devices, GreyNoise continues monitoring, and security teams worldwide are scrambling. Meanwhile, these invisible backdoors persist, turning home routers into sleeper agents. The campaign’s still active, still spreading. And somewhere, threat actors are probably laughing at how easy this was.

References

You May Also Like

450 Million Americans Exposed: DOGE Dumps Social Security Data Into Vulnerable Cloud

450 million Americans’ Social Security records dumped into unsecured cloud—your entire identity might already be compromised beyond repair.

Your Mobile Apps Are Leaking Data, Hackers Are Feasting

Your phone is betraying you – 85% of mobile apps expose vulnerabilities while hackers feast on your personal data. Security threats are exploding as smartphones become their prime hunting ground.

AI’s Dark Evolution: Deepfakes Surge as Digital Companions Raise Urgent Safety Alarms

Deepfake fraud exploded 900% while Americans encounter 2.6 fake videos daily—your bank account might already be compromised.

Outdated Airports Still Force Travelers to Dump Drinks Despite Explosive-Detecting Technology

While airports secretly possess liquid-detecting technology, millions still dump drinks at security—and won’t stop until 2043.