Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Security Privacy Wireless Networking

ASUS Router Backdoors Affect 9,000 Devices, Persists After Firmware Updates 23

An anonymous reader quotes a report from SC Media: Thousands of ASUS routers have been compromised with malware-free backdoors in an ongoing campaign to potentially build a future botnet, GreyNoise reported Wednesday. The threat actors abuse security vulnerabilities and legitimate router features to establish persistent access without the use of malware, and these backdoors survive both reboots and firmware updates, making them difficult to remove.

The attacks, which researchers suspect are conducted by highly sophisticated threat actors, were first detected by GreyNoise's AI-powered Sift tool in mid-March and disclosed Thursday after coordination with government officials and industry partners. Sekoia.io also reported the compromise of thousands of ASUS routers in their investigation of a broader campaign, dubbed ViciousTrap, in which edge devices from other brands were also compromised to create a honeypot network. Sekoia.io found that the ASUS routers were not used to create honeypots, and that the threat actors gained SSH access using the same port, TCP/53282, identified by GreyNoise in their report.
The backdoor campaign affects multiple ASUS router models, including the RT-AC3200, RT-AC3100, GT-AC2900, and Lyra Mini.

GreyNoise advises users to perform a full factory reset and manually reconfigure any potentially compromised device. To identify a breach, users should check for SSH access on TCP port 53282 and inspect the authorized_keys file for unauthorized entries.

ASUS Router Backdoors Affect 9,000 Devices, Persists After Firmware Updates

Comments Filter:
  • Van on fire (Score:1, Funny)

    by Anonymous Coward

    Put the leaders of ASUS in a van in their parking lot. Set it on fire.

  • I mean sure, it claims they are using an AI-powered tool, but if it isn't *agentic* is it really suitable for anything?

  • 'nuff said.

  • by StikyPad ( 445176 ) on Thursday May 29, 2025 @06:27PM (#65415119) Homepage

    The original announcement isn't clear, but based on the relatively low number of affected devices (there must be hundreds of thousands of these routers in use), it seems that only "savvy" users who enabled forms-based logins on the WAN port may have been affected.

    Installing a private key and enabling SSH on a non-default port (as the attackers did) is likely much more secure, if the device absolutely must be accessible, or enabling the VPN -- again with public/private key pairs.

  • What does the scouter say?
  • Because they run a modified OpenWRT it is pretty easy to install real OpenWRT onto them. As you should.

There's no such thing as a free lunch. -- Milton Friendman

Working...