Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

Posted on May 29, 2025May 29, 2025 By CWS

A classy botnet marketing campaign dubbed “AyySSHush” has compromised over 9,000 ASUS routers worldwide, establishing persistent backdoor entry that survives firmware updates and reboots. 

The stealthy operation, first detected in March 2025, demonstrates superior nation-state-level tradecraft by exploiting authentication vulnerabilities and legit router options to keep up long-term management with out deploying conventional malware.

Assault Chain Exploiting ASUS Routers

The attackers make use of a multi-stage exploitation method that begins with brute-force login makes an attempt towards ASUS router interfaces, adopted by leveraging two beforehand undisclosed authentication bypass vulnerabilities. 

As soon as privileged entry is obtained, the risk actors exploit CVE-2023-39780, an authenticated command injection flaw in ASUS router firmware, to execute arbitrary system instructions.

The essential payload exploits the oauth_google_refresh_token parameter via a POST request to /start_apply.htm, injecting the command contact /tmp/BWSQL_LOG to allow Bandwidth SQL logging options. 

This manipulation creates an assault vector via susceptible capabilities within the router’s bwsdpi_sqlite binary that go user-controlled information on to system() calls.

The attackers then allow SSH entry on the non-standard TCP port 53282 and inject their public SSH key (truncated): 

This configuration change persists throughout firmware upgrades as a result of it makes use of official ASUS settings saved in non-volatile reminiscence (NVRAM).

GreyNoise’s discovery was made attainable via their AI-powered risk looking device referred to as “Sift,” which flagged simply three anomalous HTTP POST requests amongst tens of millions of each day web visitors patterns. 

The marketing campaign’s stealth is outstanding – solely 30 malicious requests had been detected throughout three months regardless of compromising hundreds of gadgets.

Sift recognized the suspicious exercise utilizing superior machine studying methods, together with custom-built Massive Language Fashions (LLMs), nearest neighbor search, and unsupervised clustering to detect payloads focusing on ASUS RT-AC3100 and RT-AC3200 routers with manufacturing facility configurations. 

4 IP addresses have been recognized as indicators of compromise: 

101.99.91.151

101.99.94.173

79.141.163.179

111.90.146.237

Fast Motion Required

The marketing campaign represents a major safety risk because the backdoor entry can’t be eliminated via customary firmware updates. 

ASUS has launched patches addressing CVE-2023-39780, however gadgets compromised previous to patching retain the malicious SSH configuration. The attackers intentionally disable logging and TrendMicro AiProtection options to keep away from detection.

Safety specialists advocate instantly checking ASUS routers for unauthorized SSH companies on TCP port 53282 and reviewing authorized_keys recordsdata for the attacker’s public key. 

Organizations ought to block the recognized malicious IP addresses and carry out manufacturing facility resets on suspected compromised gadgets, adopted by full reconfiguration with sturdy authentication credentials. 

The sophistication and persistence of this marketing campaign counsel potential hyperlinks to superior persistent risk (APT) teams using operational relay field (ORB) networks for long-term strategic targets.

Strive in-depth sandbox malware evaluation for your SOC crew. Get ANY.RUN particular supply solely till Might 31 -> Strive Right here

Cyber Security News Tags:Access, ASUS, Botnet, Enables, Hijacks, Injecting, Key, Public, Routers, SSH

Post navigation

Previous Post: OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites
Next Post: New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware

Related Posts

Zero Trust Architecture Building Resilient Defenses for 2025 Cyber Security News
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities Cyber Security News
Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News