ASUS Router Apocalypse: AyySSHush Botnet Strikes Over 9,000 Devices!
Over 9,000 ASUS routers have been enlisted into the AyySSHush botnet army, thanks to a sneaky SSH backdoor. These routers now moonlight as part of a botnet, even after reboots and updates. GreyNoise researchers are on the case, proving once again that when it comes to tech, nothing is safe—not even your router’s downtime.

Hot Take:
Looks like ASUS routers are taking a crash course in “How to Become a Botnet Minion 101,” courtesy of the AyySSHush botnet. With over 9,000 routers compromised, it’s safe to say ASUS routers are now living their best “double agent” lives, complete with a secret SSH backdoor. Who knew routers could moonlight as secret agents?
Key Points:
- GreyNoise discovered over 9,000 ASUS routers were compromised by the AyySSHush botnet.
- Attackers added a persistent SSH backdoor, surviving reboots and firmware updates.
- Exploits target ASUS RT-AC3100, RT-AC3200, and RT-AX55 models with Out-Of-Box configurations.
- The campaign is attributed to a skilled and well-funded adversary using novel and stealthy techniques.
- GreyNoise identified four IP addresses as Indicators of Compromise linked to the botnet.
Already a member? Log in here