A sophisticated cyberattack has compromised more than 9,000 Asus routers worldwide, with security researchers warning that the campaign appears to be laying groundwork for a future large-scale botnet operation. The attack, dubbed AyySSHush, represents a concerning escalation in threats targeting consumer networking equipment.
Advanced Attack Methods Target Router Vulnerabilities
The cybercriminals behind this campaign employed multiple sophisticated techniques to gain unauthorized access to Asus routers. They utilized brute-force login attacks combined with two different authentication bypass methods, while also exploiting previously unknown vulnerabilities that have not yet received official CVE designations. Once inside the systems, attackers leveraged a known security flaw identified as CVE-2023-39780 to execute arbitrary system commands and establish persistent access.
Persistent Backdoors Survive Firmware Updates
What makes this attack particularly concerning is the attackers' use of non-volatile memory (NVRAM) to store their backdoors. This strategic placement means that the malicious access points remain intact even after users reboot their routers or update firmware. The criminals also disabled logging functions to cover their tracks, demonstrating a high level of operational security awareness that security firm GreyNoise associates with advanced persistent threat (APT) actors.
![]() |
---|
An Asus router, similar to those compromised in the recent cyberattack, highlights vulnerabilities in consumer network devices |
Stealth Operation Suggests Nation-State Involvement
Despite the large number of compromised devices, researchers have observed only 30 related access requests over a three-month period, indicating the campaign is proceeding slowly and deliberately. GreyNoise's analysis suggests this measured approach is consistent with nation-state actors or groups working on behalf of hostile governments. The security firm deliberately waited from March until May to publicly disclose their findings, allowing time to consult with government and industry partners about the implications.
Growing Threat to Consumer Network Infrastructure
The attack highlights an escalating trend of cybercriminals targeting home and small business networking equipment. John Bambenek, president of Bambenek Consulting, noted that sophisticated attackers are increasingly focusing on these devices for purposes beyond simple cryptomining operations. While household users face minimal direct risk, their compromised routers become unwitting participants in attacks against other targets, potentially causing increased security challenges during routine internet use.
Asus Responds with Patches and User Guidance
Asus has issued comprehensive guidance for affected users, confirming that the CVE-2023-39780 vulnerability has been patched in the latest firmware updates. The company sent push notifications to applicable users and updated their security advisory resources. However, for routers already compromised, Asus recommends a multi-step remediation process including disabling SSH access, blocking specific malicious IP addresses, and performing factory resets followed by manual reconfiguration.
Detection and Prevention Measures
Users can check if their routers have been compromised by examining their device's SSH settings for unauthorized access configured on port 53282. The malicious configuration includes a specific truncated SSH public key beginning with ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ. Security experts recommend disabling all remote access features including SSH, DDNS, AiCloud, and Web Access from WAN as preventive measures, noting that most users rarely need these administrative interfaces enabled.