Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability

Posted on May 29, 2025May 29, 2025 By CWS

Risk intelligence agency GreyNoise on Wednesday lifted the lid on a stealth malware marketing campaign that has quietly transformed 1000’s of internet-facing ASUS residence and small-office routers into backdoor nodes since no less than mid-March. 

In an advisory coordinated with authorities and business companions, the Washington-based GreyNoise stated unidentified attackers are chaining a mixture of brute-force logins, two older authentication bypass flaws and a 2023 command-injection bug to grab full management of the units, then utilizing official configuration settings to lock in that entry. 

The result’s what GreyNoise calls ‘AyySSHush’, a community of routers that may survive firmware upgrades, manufacturing unit reboots and most anti-malware scans, preferrred actual property for a future botnet or relay infrastructure for skilled hacking groups.

Utilizing scan knowledge from Censys, GreyNoise estimates about 9,000 ASUS routers are confirmed compromised.

Individually, French safety analysis agency Sekoia warned {that a} Chinese language-speaking risk actor referred to as ‘ViciousTrap’ has compromised greater than 5,500 edge units, turning them into honeypots.

Sekoia stated greater than 50 manufacturers, together with SOHO routers, SSL VPNs, DVRs, and BMC controllers, are being monitored by this actor, presumably to gather knowledge on vulnerabilities and exploits affecting these methods.

SecurityWeek sources say the 2 discoveries are linked.

In accordance with GreyNoise, an inner “Sift” anomaly-detection engine flagged three uncommon HTTP POST requests aimed toward absolutely emulated ASUS routers inside the corporate’s sensor grid. Commercial. Scroll to proceed studying.

The corporate’s researchers reconstructed an assault chain that toggles built-in AiProtection capabilities, allows SSH on TCP port 53282, and crops an attacker-controlled public key in non-volatile reminiscence. As a result of the tweak is saved in NVRAM somewhat than on disk, GreyNoise discovered that the backdoor persists even after directors patch the susceptible firmware or power-cycle the router. 

The attackers have been additionally noticed disabling logging to cowl their tracks.

On the centre of the exploitation chain is CVE-2023-39780, a command-injection flaw in a number of ASUS router strains that the seller quietly patched in current firmware photos. GreyNoise says the attackers begin by guessing weak credentials or leveraging two unassigned authentication bypass methods to succeed in an administrative endpoint. The already-patched safety bug is then exploited to run system instructions.

“The techniques used on this marketing campaign (stealthy preliminary entry, use of built-in system options for persistence, and cautious avoidance of detection) are according to these seen in superior, long-term operations,”GreyNoise warned.

“The extent of tradecraft suggests a well-resourced and extremely succesful adversary,” the corporate added. 

Associated: Chinese language UEFI Rootkit Discovered on Gigabyte and Asus Motherboards

Associated: Russia-Linked Cyclops Blink Botnet Attacking ASUS Routers

Associated: Researchers Uncover 40,000-Robust EOL Router, IoT Botnet 

Associated: FBI Disables “Cyclops Blink” Botnet Managed by Russian Intelligence Company

Associated: Chinese language Spies Constructed Huge Botnet of IoT Units to Goal US, Taiwan Navy

Security Week News Tags:ASUS, Backdoored, Flags, GreyNoise, Patched, Routers, Vulnerability

Post navigation

Previous Post: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers
Next Post: Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

Related Posts

CISA Releases Guidance on SIEM and SOAR Implementation Security Week News
Vulnerabilities Exposed Phone Number of Any Google User Security Week News
Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’  Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Security Week News
Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently Security Week News
AppSignal Raises $22 Million for Application Monitoring Solution Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News