Massive ASUS Router Breach: 9,000 Devices Hijacked in Stealth Cyber Espionage Campaign

Listen to this Post

Featured Image
A Hidden War at the Edge of the Internet

A silent cyberattack is sweeping through thousands of home and office networks as hackers hijack ASUS routers in an unusually stealthy and persistent operation. In a new report released by GreyNoise, a leading cyber intelligence firm, it’s been revealed that nearly 9,000 ASUS routers have been covertly compromised. But what makes this campaign different isn’t just the number of affected devices—it’s the attackers’ ability to gain long-term access without deploying traditional malware.

Instead of leaving behind detectable software or malicious files, these attackers are exploiting legitimate router features to establish backdoors that can survive firmware updates and reboots. This allows them to maintain an invisible grip on infected devices, potentially creating a decentralized army of compromised routers primed for future cyber warfare.

Experts say the campaign bears the hallmarks of an advanced persistent threat (APT)—a type of cyberattack often associated with nation-state actors such as those linked to China. Although no direct attribution has been made, the high-level operational strategy and advanced evasion techniques used suggest the threat actors are well-resourced and extremely capable.

Thousands of ASUS Routers Hijacked in Ongoing Global Attack

GreyNoise’s investigation, first launched on March 18, detected the malicious activity using its AI-powered tool called SIFT. The tool flagged unusual network payloads attempting to disable TrendMicro’s AiProtection security features embedded in ASUS routers. Researchers soon discovered a widespread infiltration that had already infected nearly 9,000 routers by May 27—and the number is still growing.

Rather than rely on malware, the attackers use a multi-phase strategy:

Initial Access: Hackers brute-force login credentials and use two unnamed zero-day vulnerabilities to bypass authentication.
Exploitation: They then deploy CVE-2023-39780, a command injection vulnerability in the ASUS RT-AX55 model, allowing them to execute system-level commands.
Persistence: The hackers activate SSH on a non-standard port (TCP/53282) and insert their own public key for remote access. These changes are saved in the router’s non-volatile memory (NVRAM), making them survive even factory firmware updates.
Stealth Mode: To avoid detection, they disable router logs and operate quietly in the background.

Despite ASUS having patched CVE-2023-39780, the attackers’ modifications to SSH settings remain untouched by the update. And since the original zero-days used for access haven’t been publicly documented or assigned CVE IDs, users have little guidance on how to protect themselves.

GreyNoise delayed public disclosure to alert authorities and industry stakeholders first. A parallel report by Sekoia, another cybersecurity firm, has dubbed the campaign “ViciousTrap.”

GreyNoise’s Mitigation Tips:

Check for SSH activity on TCP/53282.

Inspect the `authorized_keys` file for suspicious entries.

Block IP addresses: 101.99.91.151, 101.99.94.173, 79.141.163.179, 111.90.146.237.

Perform a full factory reset if compromise is suspected.

What Undercode Say:

This ASUS router attack is not your typical botnet campaign. It’s a meticulously executed infiltration that leverages the inherent features of network hardware to sustain a silent occupation. This approach, which avoids dropping any detectable malware, reflects a new standard in cyber espionage. The fact that this campaign can survive firmware upgrades suggests a level of sophistication we usually see in military-grade cyber operations.

The use of zero-day authentication bypasses and stealth command injections points toward a group with deep pockets and insider knowledge. By storing access credentials in non-volatile memory and using custom SSH ports, the attackers ensure long-term access with almost no forensic footprint. This isn’t just about spying or IP theft—it’s about building infrastructure for something bigger, possibly a global ORB network ready for coordinated botnet attacks.

The lack of assigned CVEs for the login bypass methods also highlights a worrying gap in the cyber defense ecosystem. It means these vulnerabilities may be unknown to most security professionals and therefore unpatched in the wild. ASUS users are essentially flying blind unless they know exactly what to look for.

Moreover, this campaign once again illustrates the growing trend of targeting edge devices—routers, cameras, IoT hubs—which sit outside the usual security perimeters. As more homes and small businesses rely on these devices, they become the weak link in the cybersecurity chain.

The campaign also demonstrates a growing convergence between espionage and infrastructure manipulation. By taking control of routers, the attackers don’t just get data—they get positioning. These infected devices can be used for proxying attacks, collecting metadata, launching DDoS strikes, or even manipulating traffic in real time.

This is also a lesson in the importance of outbound traffic monitoring. Most users don’t notice when their router is quietly pinging a suspicious IP, especially if the firmware UI offers no real-time insights. Manufacturers like ASUS need to implement better intrusion detection, logging, and real-time alerts.

Lastly, while some mitigation steps are available—like factory resets and blocking known IPs—they’re not scalable for non-technical users. A broader firmware reengineering effort is required to fully flush out these backdoors and prevent similar intrusions in the future.

Fact Checker Results ✅

GreyNoise and Sekoia both confirmed the compromise independently.

CVE-2023-39780 is verified and officially patched by ASUS.

Attack methods and SSH manipulation confirmed in GreyNoise technical report. 🔍🛡️⚠️

Prediction 🔮

The ASUS router breach is likely just the tip of the iceberg. Similar tactics will soon be replicated across other router brands and IoT platforms. Expect to see more long-dormant botnets awaken in future coordinated attacks, potentially targeting critical infrastructure or large-scale disinformation campaigns. Governments and corporations may soon have to adopt zero-trust policies even at the hardware level.

References:

Reported By: www.infosecurity-magazine.com
Extra Source Hub:
https://www.linkedin.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram