New AyySSHush botnet ... adding a persistent SSH backdoor

Post new topic   Reply to topic    DD-WRT Forum Index -> Generic Questions
Author Message
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1884
Location: Hung Hom, Hong Kong

PostPosted: Sat May 31, 2025 12:24    Post subject: New AyySSHush botnet ... adding a persistent SSH backdoor Reply with quote
New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.
May 29, 2025
https://securityaffairs.com/178413/malware/new-ayysshush-botnet-compromised-over-9000-asus-routers-adding-a-persistent-ssh-backdoor.html

GreyNoise discovered the AyySSHush botnet has hacked over 9,000 ASUS routers, adding a persistent SSH backdoor.

“Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and novel tradecraft in ASUS AiProtection features on those routers.” states GreyNoise.

... more ....

The payloads observed by the experts only target ASUS RT-AC3100 or RT-AC3200 with an Out-Of-Box configuration.

GreyNoise also found a payload exploiting the authenticated command injection flaw CVE-2023-39780 in ASUS RT-AX55 v3.0.0.4.386.51598 to execute arbitrary system commands.

The attackers exploit the command injection flaw to add their SSH key and enable access on port 53282, ensuring persistent backdoor access across reboots and updates.

... more ....



Related:

AyySSHush: Tradecraft of an emergent ASUS botnet – GreyNoise Labs
May 28, 2025
https://www.labs.greynoise.io/grimoire/2025-03-28-ayysshush/

華碩路由器遭殭屍網路AyySSHush綁架 - 電腦資訊轉貼
https://www.hkepc.com/forum/viewthread.php?fid=110&tid=2748957

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw
Sponsor
mrjlaunch
DD-WRT Novice


Joined: 09 Jun 2025
Posts: 2

PostPosted: Mon Jun 09, 2025 6:16    Post subject: Reply with quote
So this issue affects the RT-AC3100 and RT-AC3200. The Greynoise article also confirms the RT-AX55 is susceptible.

Now I'm wondering if my vanilla DSL-AC88U would be affected.

What precautions can I take to prevent the exploit? And is flashing to WRT going to close the exploit?
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 16139
Location: Texas, USA

PostPosted: Mon Jun 09, 2025 7:15    Post subject: Reply with quote
There are no third-party firmware projects that support the DSL combo devices 100%. Your device is EOL, and the most recent GPL tarball is not for the latest release of stock firmware. IOW, there is no fixing it unless you know how to finesse some patches and updates to the latest 2019 GPL tarball (GPL of ASUS DSL-AC88U Annex A for firmware 1.10.06_Build591) and roll your own firmware image.

https://www.asus.com/networking-iot-servers/modem-routers/all-series/dsl-ac88u/helpdesk_bios?model2Name=DSL-AC88U
Quote:
ASUS DSL-AC88U Firmware version v1.10.08_Build593 (This product supports Annex A)
Version 1.10.08_Build593
33.34 MB
2021/08/25
This model was end of its life, and its firmware, utility, website, and manual will no longer be updated. For more details, please refer to https://www.asus.com/event/network/eol-product/

Fixed CVE-2021-20090

Please unzip the firmware file first then check the MD5 code.
MD5: 6a255909d9b82cf1f094caa4c8469dc1

_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
RSS feed for DD-WRT releases (2025)
RSS feed for DD-WRT releases (2024)
RSS feed for DD-WRT releases (2023)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
mrjlaunch
DD-WRT Novice


Joined: 09 Jun 2025
Posts: 2

PostPosted: Mon Jun 09, 2025 8:01    Post subject: Reply with quote
Thanks for the reply, though that's upsetting, I only bought my AC88U in 2022.

Making my own firmware is waaaaaay beyond my skill level.

Is there a way I can prevent the exploit on my AC88U, ie. turning off WAN remote access?
Per Yngve Berg
DD-WRT Guru


Joined: 13 Aug 2013
Posts: 7034
Location: Romerike, Norway

PostPosted: Mon Jun 09, 2025 9:58    Post subject: Reply with quote
Put it in Bridge Mode and have a dd-wrt router behind it.
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Generic Questions All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum