Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

Posted on May 29, 2025May 29, 2025 By CWS

A classy botnet marketing campaign dubbed “AyySSHush” has compromised over 9,000 ASUS routers worldwide, establishing persistent backdoor entry that survives firmware updates and reboots. 

The stealthy operation, first detected in March 2025, demonstrates superior nation-state-level tradecraft by exploiting authentication vulnerabilities and legit router options to keep up long-term management with out deploying conventional malware.

Assault Chain Exploiting ASUS Routers

The attackers make use of a multi-stage exploitation method that begins with brute-force login makes an attempt towards ASUS router interfaces, adopted by leveraging two beforehand undisclosed authentication bypass vulnerabilities. 

As soon as privileged entry is obtained, the risk actors exploit CVE-2023-39780, an authenticated command injection flaw in ASUS router firmware, to execute arbitrary system instructions.

The essential payload exploits the oauth_google_refresh_token parameter via a POST request to /start_apply.htm, injecting the command contact /tmp/BWSQL_LOG to allow Bandwidth SQL logging options. 

This manipulation creates an assault vector via susceptible capabilities within the router’s bwsdpi_sqlite binary that go user-controlled information on to system() calls.

The attackers then allow SSH entry on the non-standard TCP port 53282 and inject their public SSH key (truncated): 

This configuration change persists throughout firmware upgrades as a result of it makes use of official ASUS settings saved in non-volatile reminiscence (NVRAM).

GreyNoise’s discovery was made attainable via their AI-powered risk looking device referred to as “Sift,” which flagged simply three anomalous HTTP POST requests amongst tens of millions of each day web visitors patterns. 

The marketing campaign’s stealth is outstanding – solely 30 malicious requests had been detected throughout three months regardless of compromising hundreds of gadgets.

Sift recognized the suspicious exercise utilizing superior machine studying methods, together with custom-built Massive Language Fashions (LLMs), nearest neighbor search, and unsupervised clustering to detect payloads focusing on ASUS RT-AC3100 and RT-AC3200 routers with manufacturing facility configurations. 

4 IP addresses have been recognized as indicators of compromise: 

101.99.91.151

101.99.94.173

79.141.163.179

111.90.146.237

Fast Motion Required

The marketing campaign represents a major safety risk because the backdoor entry can’t be eliminated via customary firmware updates. 

ASUS has launched patches addressing CVE-2023-39780, however gadgets compromised previous to patching retain the malicious SSH configuration. The attackers intentionally disable logging and TrendMicro AiProtection options to keep away from detection.

Safety specialists advocate instantly checking ASUS routers for unauthorized SSH companies on TCP port 53282 and reviewing authorized_keys recordsdata for the attacker’s public key. 

Organizations ought to block the recognized malicious IP addresses and carry out manufacturing facility resets on suspected compromised gadgets, adopted by full reconfiguration with sturdy authentication credentials. 

The sophistication and persistence of this marketing campaign counsel potential hyperlinks to superior persistent risk (APT) teams using operational relay field (ORB) networks for long-term strategic targets.

Strive in-depth sandbox malware evaluation for your SOC crew. Get ANY.RUN particular supply solely till Might 31 -> Strive Right here

Cyber Security News Tags:Access, ASUS, Botnet, Enables, Hijacks, Injecting, Key, Public, Routers, SSH

Post navigation

Previous Post: OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites
Next Post: New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware

Related Posts

Hackers Exploit Outlook for Linux Backdoor Stealth Hackers Exploit Outlook for Linux Backdoor Stealth Cyber Security News
Critical Flaw in Perplexity’s Comet Browser Exploited Critical Flaw in Perplexity’s Comet Browser Exploited Cyber Security News
Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys Cyber Security News
Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
Adobe’s August 2025 Patch Tuesday Adobe’s August 2025 Patch Tuesday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark