Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign

Exposure Management, IoT, Threat Hunting Module

Executive Summary:

  • new, stealthy ASUS router botnet, dubbed AyySSHush, abuses trusted firmware features through a multi-stage attack sequence to backdoor routers and persist across firmware updates, evading traditional detection methods.
  • GreyNoise observed the campaign in March 2025; Censys scan data reveals its global footprint and how it’s evolved over the past five months
  • 4,504 ASUS devices show indicators of compromise as of May 28, 2025, identified by having SSH running on port TCP/53282 — a relatively strong indicator of AyySSHush compromise since this high, nonstandard port is specifically used by the botnet
  • The compromises are globally spread with an APAC concentration: the top affected countries include the U.S., Sweden, Taiwan, Singapore, and Hong Kong.
  • Residential ISPs across Asia, Europe, and the U.S. appear to be the main targeted networks, aligning with the typically observed residential proxy botnet strategy that mimics legitimate users to evade detection.
  • Historical trends in compromises observed online reveal a highly dynamic scale of botnet operations that rapidly scaled up and down by 50% in a matter of weeks
  • Attackers leverage ASUS’s own built-in configuration tools to inject SSH keys that survive firmware resets — patching alone isn’t enough.
  • Check out our live dashboard tracking exposed ASUS devices with indicators of compromise

Introduction

On March 18 2025, researchers at GreyNoise uncovered a sophisticated botnet campaign targeting ASUS routers. Dubbed AyySSHush, the operation exploits legitimate features of ASUS’s AiProtection system to implant persistent SSH backdoors that survive firmware resets. This is an alarming example of threat actors exploiting vendor-sanctioned capabilities to establish a persistent, hard-to-detect presence in consumer-grade hardware.

Censys has been tracking this botnet’s global footprint in partnership with findings from both GreyNoise and Sekoia researchers.

To aid in ongoing tracking and research, we’ve launched a live dashboard that tracks exposed ASUS routers showing indicators of AyySSHush compromise. The data updates daily and provides real-time insight into global trends.

Screenshot-2025-05-30-at-9.08.57-AM.png

What’s Unique About This Botnet?

According to GreyNoise’s research, the attackers exploit a combination of old and new vulnerabilities to compromise and gain persistence on these routers in a multi-stage attack sequence:

  • Initial access:
    • Launch brute-force attacks targeting login.cgi to compromise devices with weak credentials OR exploit older authentication bypass vulnerabilities to gain admin access
  • Command Injection:
    • Send malicious POST requests to /start_apply.htm targeting the AiProtection_HomeProtection.asp page (an AI router security feature offered by ASUS)
    • Exploit CVE-2023-39780, an authenticated command injection vulnerability  (originally discovered by security researcher leeya_bug) through a malicious OAuth Google refresh token parameter
    • Run the command touch /tmp/BWSQL_LOG to create an empty file that enables BandWidth SQLite LOGging (BWDPI), a legitimate TrendMicro feature embedded in ASUS routers
    • Abuse this for persistent logging capabilities
  • SSH Backdoor Installation
    • Enable SSH access across both LAN and WAN interfaces
    • Bind SSH to an unusual, high-numbered port: TCP/53282
    • Inject their SSH public key into /etc/ssh/authorized_keys via legitimate router settings
    • Establish exclusive SSH access that bypasses normal authentication mechanisms

The real kicker is that in this last step, the attacker leverages ASUS’s own built-in configuration management system to ensure persistence – a very clever abuse of normally trusted features. Since the SSH key is added via the router’s official config interface, it is retained across firmware updates, meaning they can maintain access even after CVE-2023-39780 is patched. This means that even users who proactively upgrade their router firmware to patch vulnerabilities may remain unknowingly compromised. Factory resets may not always clear the backdoor either, depending on the router’s specific configuration and features. 

This makes AyySSHush a particularly stealthy and resilient campaign and part of a broader shift in threat actor TTPs toward “living off the firmware.” It’s also hard to ignore the irony of a botnet successfully compromising routers by exploiting the very security features designed to protect against such attacks.

The AyySSHush botnet has not been formally attributed to any specific group or nation. However, researchers at Sekoia identified a shared command-and-control IP address between AyySSHush and an edge device exploitation campaign carried out by a threat actor dubbed ViciousTrap. It still remains unclear who the operators of AyySSHush are.

Censys’ Perspective

To get a picture of the potential scale and spread of AyySSHush, we queried Censys internet scan data for ASUS routers with TCP/53282 open. Our goal was to quantify the current state of global exposure and map trends in ASUS models, networks, and regions most affected by compromises.

As of May 28, 2025, there are 4,504 potentially compromised ASUS routers with TCP port 53282 exposed – corroborating findings from other sources that there are thousands of vulnerable devices that could be part of a botnet infrastructure. Note that this number differs from other publicly reported numbers because we’ve chosen to filter out known honeypot and tarpit configurations. 

It appears that ASUS mesh networking systems are disproportionately targeted, with ZenWiFi and Lyra models accounting for nearly half (45.4%) of all compromised devices at 1,048 and 997 infections respectively. Traditional router models like the RT-AC88U, RT-AX55, and TUF-AX3000 make up the next tier of compromised devices, which includes both consumer and gaming-focused product lines. 

Screenshot-2025-05-29-at-11.46.04-AM.png
Top 10 ASUS Devices Showing Signs of AyySSHush Compromise:

The geographic distribution shows that compromises are mostly geolocated in the U.S., Sweden, Taiwan, Singapore, and Hong Kong, in that order. The United States leads globally with over 900 compromised devices (20.58%), though the overall pattern indicates this botnet has achieved significant international reach. It’s interesting that many of these are in Asia-Pacific regions, with Taiwan, Singapore, and Hong Kong accounting for nearly 40% of all compromised devices. There’s overlap here with the top 5 countries we observe running ASUS devices overall: the U.S., Hong Kong, Taiwan, Sweden, and China. Note: The presence of compromised routers in a particular country does not indicate the attacker’s location. Compromised devices could be operated by anyone, anywhere.

Screenshot-2025-05-29-at-11.50.33-AM.png

Map of Currently Exposed ASUS Devices Showing Signs of AyySSHush Compromise:
Screenshot-2025-05-29-at-11.55.27-AM.png

Top 10 Countries Hosting Potentially Compromised ASUS Devices:

Our scans reveal a heavy concentration of compromised devices within major telecommunications providers, with Asian and European telecoms like HINET (Taiwan), MobileOne (Singapore), HKT Limited (Hong Kong), and Telia (Sweden) accounting for over a third of all infections, as well as a presence of major US providers like Comcast and Charter

Attackers are known to specifically target residential broadband networks like these because it makes detection more difficult. Telecom infrastructure provides ideal cover for malicious proxy networks and ORB (open residential botnet) operations because residential IP addresses appear more legitimate to security systems, bypass many IP-based blocking mechanisms, and can blend in with normal consumer traffic patterns that ISPs expect to see.

This botnet has clearly achieved global reach across residential networks, likely with the aim of creating a distributed proxy infrastructure that can be leveraged for malicious activities while avoiding detection.

Screenshot-2025-05-29-at-11.45.45-AM.png

Top 10 Networks Hosting Potentially Compromised ASUS Devices:

Historical Trends: A Volatile Botnet

Screenshot-2025-05-30-at-7.21.26-AM_2025-05-30-130736_iyga.png

Five Month Trendline of Exposed Potentially Compromised ASUS Devices (Jan-May 2025)

Detection and Mitigation

Identifying ASUS Routers Exposing TCP/53282 On Your Network

Censys uses passive internet scanning across all 65,535 ports to identify potentially compromised devices, but cannot directly access local filesystem artifacts. Organizations should use the provided query to identify hosts of concern within their networks, then directly examine those ASUS devices for the specific filesystem artifacts and SSH key added during compromise.

The following Censys Platform query can be used to identify potentially compromised ASUS devices: 

host.services:(port="53282" and protocol="SSH") and 
(host.services.software.vendor:"Asus" or host.services.hardware.vendor:"Asus" 
or host.services.operating_systems.vendor:"Asus" or host.services.software.vendor:"ASUS" 
or host.services.hardware.vendor:"ASUS" or host.services.operating_systems.vendor:"ASUS" 
or host.services.endpoints.http.html_title:"ASUS Wireless Router")

GreyNoise has shared a few IoCs, including:

Malicious SSH Public Key

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZJ8L5mzhhaxfGzpHR8Geay/xDlVDS
J8MJwA4RJ7o21KVfRXqFblQH4L6fWIYd1ClQbZ6Kk1uA1r7qx1qEQ2PqdVMhnNdHACvCVz/MPHTVebtkKhEl98MZiMOvUNP
tAC9ppzOSi7xz3cSV0n1pG/dj+37pzuZUpm4oGJ3XQR2tUPz5MddupjJq9/gmKH6SJjTrHKSECe5yEDs6c3v6uN4dnFNYA5
MPZ52FGbkhzQ5fy4dPNf0peszR28XGkZk9ctORNCGXZZ4bEkGHYut5uvwVK1KZOYJRmmj63drEgdIioFv/x6IcCcKgi2w==

Filesystem Artifacts

  • /tmp/BWSQL-LOG
    • A log file created by the malware during the infection process
  • /tmp/home/root/.ssh/authorized_keys
    • core persistence mechanism of AyySSHush, where the attacker will inject their SSH key during compromise 

Known Malicious AyySSHush C2s observed by GreyNoise

  • 101[.]99[.]91[.]151
  • 101[.]99[.]94[.]173
  • 79[.]141[.]163[.]179
  • 111[.]90[.]146[.]237
A young woman with long black hair, wearing a white shirt and black blazer, smiling confidently.
AUTHOR
Himaja Motheram
Himaja Motheram is a Security Researcher who is passionate about continuous learning and tackling complex challenges in vulnerability measurement. As a co-host of the Storm⚡️Watch podcast, she discusses emerging threats, industry trends, and new research. As a proud University of Michigan graduate, she values sharing knowledge and tools to help the security community.

Subscribe to our blog