ASUS Router Backdoor Attack: Over 9,000 Devices Compromised in Stealth Nation-State Campaign

It's not easy to detect these backdoors.

Cybersecurity company GreyNoise reported an advanced and persistent attack infecting thousands of ASUS home and small office routers.

The covert campaign, suspected to be carried out by a nation-state or highly sophisticated threat group, drops a persistent backdoor that remains effective through both firmware updates and reboots.

What's worse is that the typical user can't discover the backdoor.

Unpatched and Unseen ASUS Router Vulnerabilities

As per Greynoise, the attackers first take over the ASUS routers by taking advantage of various vulnerabilities. Some are fixed, others never having been officially recorded in the CVE system. One such confirmed vulnerability, CVE-2023-39780, enables command injection, allowing full system command execution.

After access has been gained, the threat actor drops a public SSH encryption key, allowing future logins through a matching private key with full administrator privileges.

Long-Term Persistence Without Malware

What's so hazardous about this attack is the persistence of the access. GreyNoise says the attacker doesn't drop malware or leave normal indicators of compromise. Instead, they chain exploits, bypass authentication, and change legitimate system settings—surviving through firmware updates and system reboots.

According to Ars Technica, researchers maintain that this method "enables long-lasting control over the routers," enabling the actor to quietly expand their botnet of exploited systems, perhaps for use in an extensive coordinated attack.

ViciousTrap: A Coordinated Campaign with Global Reach

GreyNoise says that this attack is a part of a greater campaign monitored as "ViciousTrap", which was initially used to describe the campaign by cybersecurity company Sekoia.

Web scans carried out by network analytics provider Censys indicate that potentially up to 9,500 ASUS routers have already been exploited.

While the threat actor has yet to engage the network of compromised routers, researchers say this may be the calm before the storm, suggesting potential for future widespread disruption or spy operations.

How to Tell If Your ASUS Router Has Been Compromised

The only means of verification is by manual scanning:

  1. Access your router's settings page
  2. Go to the SSH configuration
  3. Check for suspicious entries on port 53282
  4. Scan for the malicious SSH key beginning with: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ.
  5. If it discovers a backdoor, delete the key and switch off the port configuration at once.

Additionally, look for connections from the following IP addresses, associated with the attack:

  • 101.99.91.151
  • 101.99.94.173
  • 79.141.163.179
  • 111.90.146.237

To reduce risk, always keep your router's firmware up to date, regardless of brand. Enable automatic updates if available and disable remote access unless absolutely necessary. Change default passwords and consider using a firewall or network monitoring tool to detect unusual activity.

ⓒ 2025 TECHTIMES.com All rights reserved. Do not reproduce without permission.

Tags:Asus
Join the Discussion