BREAKINGON

Asus Routers Under Attack: A Stealthy Backdoor Threat Revealed

5/29/2025
Thousands of Asus routers are infected with a stealthy backdoor that persists through reboots and updates, raising concerns about nation-state involvement. Learn how to check your device and protect yourself.
Asus Routers Under Attack: A Stealthy Backdoor Threat Revealed
A stealthy backdoor in Asus routers allows attackers to maintain control over devices. Discover how to check if you're affected and secure your router.

Stealthy Backdoor Infects Asus Routers, Researchers Warn

In a concerning cybersecurity revelation, researchers have identified that thousands of home and small office routers manufactured by Asus are being compromised by a stealthy backdoor that can survive reboots and firmware updates. This attack is believed to be orchestrated by a nation-state or a similarly well-resourced threat actor, posing serious risks to users worldwide.

How the Attackers Gain Access

The unknown attackers are exploiting a series of now-patched vulnerabilities to gain unauthorized access to these devices. Alarmingly, some of these vulnerabilities have not been tracked through the internationally recognized CVE system, making them even more dangerous. Once the attackers gain administrative control, they proceed to install a public encryption key, allowing access to the device via SSH. This means that anyone possessing the private key can log in with full administrative rights, effectively compromising the device.

Durable Control Over Infected Devices

According to researchers from the security firm GreyNoise, “The attacker’s access survives both reboots and firmware updates, giving them durable control over affected devices.” This persistent access is maintained without deploying malware or leaving obvious traces. The attackers utilize a combination of authentication bypasses, exploit known vulnerabilities, and abuse legitimate configuration features to ensure their control remains intact.

Scope of the Compromise

GreyNoise has tracked approximately 9,000 devices globally that have been backdoored in this ongoing campaign, with the threat continuing to expand. Researchers have noted that there is currently no evidence indicating that the compromised devices have been utilized for any malicious activities. Instead, it appears that this operation is in its initial stages, with the threat actor amassing a significant number of compromised devices for potential future exploitation.

Ties to Nation-State Activity

GreyNoise detected this campaign in mid-March and chose to hold off on public reporting until they notified unnamed government agencies. This precaution raises suspicions that the threat actor may have connections to a nation-state. Furthermore, the activity observed aligns with a larger campaign reported by fellow security firm Sekoia, which identified potential compromises affecting as many as 9,500 Asus routers under the moniker “ViciousTrap.”

Exploited Vulnerabilities

The attackers are leveraging multiple vulnerabilities to backdoor the devices, including CVE-2023-39780, a command injection flaw that allows for the execution of system commands. Asus has patched this vulnerability in a recent firmware update. However, the remaining vulnerabilities, which have also been patched, have not been assigned CVE tracking designations for reasons that remain unclear.

How to Check if Your Router is Infected

Router users can determine if their devices are infected by inspecting the SSH settings in their configuration panel. Infected routers will show that they can be accessed via SSH over port 53282, utilizing a digital certificate with a truncated key that begins with ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ.... To eliminate the backdoor, users should remove the key and the port setting from their configurations.

Identifying Potential Breaches

Users can also check their system logs for any unauthorized access attempts through specific IP addresses: 101.99.91.151, 101.99.94.173, 79.141.163.179, or 111.90.146.237. It is crucial for all router users, regardless of brand, to ensure that their devices receive security updates promptly to mitigate such threats.

Breakingon.com is an independent news platform that delivers the latest news, trends, and analyses quickly and objectively. We gather and present the most important developments from around the world and local sources with accuracy and reliability. Our goal is to provide our readers with factual, unbiased, and comprehensive news content, making information easily accessible. Stay informed with us!
© Copyright 2025 BreakingOn. All rights reserved.