Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

Posted on May 29, 2025May 29, 2025 By CWS

A classy botnet marketing campaign dubbed “AyySSHush” has compromised over 9,000 ASUS routers worldwide, establishing persistent backdoor entry that survives firmware updates and reboots. 

The stealthy operation, first detected in March 2025, demonstrates superior nation-state-level tradecraft by exploiting authentication vulnerabilities and legit router options to keep up long-term management with out deploying conventional malware.

Assault Chain Exploiting ASUS Routers

The attackers make use of a multi-stage exploitation method that begins with brute-force login makes an attempt towards ASUS router interfaces, adopted by leveraging two beforehand undisclosed authentication bypass vulnerabilities. 

As soon as privileged entry is obtained, the risk actors exploit CVE-2023-39780, an authenticated command injection flaw in ASUS router firmware, to execute arbitrary system instructions.

The essential payload exploits the oauth_google_refresh_token parameter via a POST request to /start_apply.htm, injecting the command contact /tmp/BWSQL_LOG to allow Bandwidth SQL logging options. 

This manipulation creates an assault vector via susceptible capabilities within the router’s bwsdpi_sqlite binary that go user-controlled information on to system() calls.

The attackers then allow SSH entry on the non-standard TCP port 53282 and inject their public SSH key (truncated): 

This configuration change persists throughout firmware upgrades as a result of it makes use of official ASUS settings saved in non-volatile reminiscence (NVRAM).

GreyNoise’s discovery was made attainable via their AI-powered risk looking device referred to as “Sift,” which flagged simply three anomalous HTTP POST requests amongst tens of millions of each day web visitors patterns. 

The marketing campaign’s stealth is outstanding – solely 30 malicious requests had been detected throughout three months regardless of compromising hundreds of gadgets.

Sift recognized the suspicious exercise utilizing superior machine studying methods, together with custom-built Massive Language Fashions (LLMs), nearest neighbor search, and unsupervised clustering to detect payloads focusing on ASUS RT-AC3100 and RT-AC3200 routers with manufacturing facility configurations. 

4 IP addresses have been recognized as indicators of compromise: 

101.99.91.151

101.99.94.173

79.141.163.179

111.90.146.237

Fast Motion Required

The marketing campaign represents a major safety risk because the backdoor entry can’t be eliminated via customary firmware updates. 

ASUS has launched patches addressing CVE-2023-39780, however gadgets compromised previous to patching retain the malicious SSH configuration. The attackers intentionally disable logging and TrendMicro AiProtection options to keep away from detection.

Safety specialists advocate instantly checking ASUS routers for unauthorized SSH companies on TCP port 53282 and reviewing authorized_keys recordsdata for the attacker’s public key. 

Organizations ought to block the recognized malicious IP addresses and carry out manufacturing facility resets on suspected compromised gadgets, adopted by full reconfiguration with sturdy authentication credentials. 

The sophistication and persistence of this marketing campaign counsel potential hyperlinks to superior persistent risk (APT) teams using operational relay field (ORB) networks for long-term strategic targets.

Strive in-depth sandbox malware evaluation for your SOC crew. Get ANY.RUN particular supply solely till Might 31 -> Strive Right here

Cyber Security News Tags:Access, ASUS, Botnet, Enables, Hijacks, Injecting, Key, Public, Routers, SSH

Post navigation

Previous Post: OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites
Next Post: New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware

Related Posts

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
From SOC to SOAR Automating Security Operations Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Actionable Threat Intelligence for Mitigating Emerging Cyber Threats Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News