8,000 Asus Routers Compromised in Botnet Attack

8,000 Asus Routers Compromised in Botnet Attack

Introduction
A newly identified botnet, dubbed AyySSHush, has compromised thousands of Asus routers, aiming to disable security features from Trend Micro and exploit vulnerabilities for backdoor access. Discovered by threat monitoring firm GreyNoise in March, the botnet highlights significant risks for affected users and organizations.

Key Details Section:

  • Who: GreyNoise, a threat monitoring company.
  • What: Identification of the AyySSHush botnet targeting Asus routers.
  • When: Discovered in March, with details disclosed recently after working with government and industry partners.
  • Where: Over 8,000 infected hosts were reported, primarily affecting popular models like RT-AC3100 and RT-AX55.
  • Why: The botnet leverages generic brute-force attacks and authentication bypass vulnerabilities to gain access.
  • How: Attackers are employing methods such as enabling SSH access, binding to TCP/53282, and adding a public key for ongoing control.

Why It Matters
The AyySSHush botnet has implications for several operational areas:

  • Enterprise Security: Compromised routers could expose sensitive data, posing risks to compliance and security standards.
  • Hybrid/Multi-Cloud Adoption: If IoT devices are compromised, the integrity of cloud environments could be at stake.
  • Server/Network Automation: Persistent backdoors complicate the security landscape, making automated management and monitoring challenging.

Takeaway
IT professionals should proactively assess their Asus routers for signs of compromise. Regular firmware updates alone will not eliminate the SSH backdoor; a factory reset is advisable for affected devices. Staying vigilant against such threats is essential for safeguarding infrastructure integrity.

For more curated news and infrastructure insights, visit www.trendinfra.com.

meenakande

Hey there! I’m a proud mom to a wonderful son, a coffee enthusiast ☕, and a cheerful techie who loves turning complex ideas into practical solutions. With 14 years in IT infrastructure, I specialize in VMware, Veeam, Cohesity, NetApp, VAST Data, Dell EMC, Linux, and Windows. I’m also passionate about automation using Ansible, Bash, and PowerShell. At Trendinfra, I write about the infrastructure behind AI — exploring what it really takes to support modern AI use cases. I believe in keeping things simple, useful, and just a little fun along the way

Leave a Reply

Your email address will not be published. Required fields are marked *