Categories: Cyber Security News

New Botnet Compromises 9,000 ASUS Routers by Injecting SSH Public Keys

A cybersecurity researchers at GreyNoise have uncovered a sophisticated exploitation campaign targeting thousands of ASUS routers worldwide, with attackers establishing persistent backdoor access that survives both reboots and firmware updates.

The operation, detected through the company’s proprietary AI-powered analysis tool called Sift, represents a concerning escalation in router-based attacks that could serve as the foundation for a massive botnet infrastructure.

The attack campaign, which began in March 2025, has successfully compromised nearly 9,000 ASUS routers according to data from internet monitoring platform Censys.

What makes this operation particularly alarming is its stealth approach—GreyNoise sensors detected only 30 related requests across three months, demonstrating the attackers’ careful efforts to avoid detection while systematically building their network of compromised devices.

The discovery timeline reveals a coordinated response effort, beginning when GreyNoise’s Sift AI technology flagged anomalous traffic on March 17, 2025.

Researchers began investigating the following day, with disclosure initially deferred to coordinate with government and industry partners.

The findings align with similar discoveries announced by Sekoia on May 22, 2025, as part of their ‘ViciousTrap’ campaign research.

ASUS Routers

The attackers employ a sophisticated four-stage exploitation chain that demonstrates advanced technical knowledge of ASUS router systems.

Initial access is gained through brute-force login attempts combined with two authentication bypass techniques that currently lack assigned CVE identifiers.

Once inside, attackers leverage CVE-2023-39780, a command injection vulnerability, to execute arbitrary system commands on the compromised devices.

The persistence mechanism represents the most concerning aspect of this campaign. Attackers abuse legitimate ASUS router features to enable SSH access on a custom port (TCP/53282) and inject their own public SSH key into the system’s authorized_keys file.

Critically, this configuration is stored in the router’s non-volatile memory (NVRAM) rather than on disk, ensuring the backdoor survives firmware updates and device reboots.

The attackers also disable logging functions before establishing persistence, further reducing their chances of detection.

ASUS Patches Vulnerability

While ASUS has released firmware updates addressing CVE-2023-39780 and the authentication bypass techniques, the company’s patches do not automatically remove existing SSH configurations from previously compromised devices.

This means routers that were infected before updating will retain their backdoor access unless administrators manually review and remove unauthorized SSH keys.

Security researchers have identified four malicious IP addresses associated with this campaign: 101.99.91.151, 101.99.94.173, 79.141.163.179, and 111.90.146.237.

Network administrators are advised to immediately block these addresses and check their ASUS routers for unauthorized SSH access on port 53282.

For organizations suspecting compromise, experts recommend performing a complete factory reset followed by manual reconfiguration rather than relying solely on firmware updates.

The sophisticated nature of this campaign, with its emphasis on stealth and persistence, suggests the involvement of well-resourced threat actors potentially building infrastructure for future large-scale operations.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

The post New Botnet Compromises 9,000 ASUS Routers by Injecting SSH Public Keys appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

‘It’s a Real Shame’ — Peter Jackson, Architect of the Much-Loved Lord of the Rings Extended Edition DVDs, Laments the Decline of Physical Media

The Lord of the Rings director Peter Jackson has lamented the decline of physical media,…

21 seconds ago

Amazon Redshift JDBC Driver Flaws Enable Remote Code Execution

Amazon Redshift users are facing a serious security risk after researchers uncovered a high-severity vulnerability…

35 seconds ago

Multiple cPanel Bugs Allow Access to Critical System Resources

A wave of critical security flaws in cPanel & WHM is putting millions of hosted…

48 seconds ago

79 Chrome Vulnerabilities Patched, Including 14 Critical Flaws – Update Now

Google has released a major Chrome security update, fixing 79 vulnerabilities in its Stable channel,…

1 minute ago

Cisco Catalyst SD-WAN Controller 0-Day Exploited for Admin Access

A maximum-severity zero-day vulnerability in Cisco’s Catalyst SD-WAN platform is being actively exploited in the…

1 minute ago

Top 10 Best Account Takeover Protection Tools in 2026

Account Takeover (ATO) attacks are one of the fastest-growing cyber threats targeting businesses and individuals…

2 minutes ago

This website uses cookies.