- Joined
- Jul 25, 2006
- Messages
- 14,089 (2.04/day)
- Location
- Nebraska, USA
System Name | Brightworks Systems BWS-6 E-IV |
---|---|
Processor | Intel Core i5-6600 @ 3.9GHz |
Motherboard | Gigabyte GA-Z170-HD3 Rev 1.0 |
Cooling | Quality Fractal Design Define R4 case, 2 x FD 140mm fans, CM Hyper 212 EVO HSF |
Memory | 32GB (4 x 8GB) DDR4 3000 Corsair Vengeance |
Video Card(s) | EVGA GEForce GTX 1050Ti 4Gb GDDR5 |
Storage | Samsung 850 Pro 256GB SSD, Samsung 860 Evo 500GB SSD |
Display(s) | Samsung S24E650BW LED x 2 |
Case | Fractal Design Define R4 |
Power Supply | EVGA Supernova 550W G2 Gold |
Mouse | Logitech M190 |
Keyboard | Microsoft Wireless Comfort 5050 |
Software | W10 Pro 64-bit |

Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
Over 9,000 ASUS routers are compromised by a novel botnet dubbed "AyySSHush" that was also observed targeting SOHO routers from Cisco, D-Link, and Linksys.
Also, Thousands of Asus routers are being hit with stealthy, persistent backdoors
Backdoor giving full administrative control can survive reboots and firmware updates.
Thousands of home and small office routers manufactured by Asus are being infected with a stealthy backdoor... ...in an attack by a nation-state or another well-resourced threat actor, researchers said.
Original source of discovery and report: GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
I note BC reports some SOHO routers from CIsco, D-Link and Linksys were also targeted but that is not reported in the GrayNoise report they cite.

Apparently, ASUS has yet to develop a permanent patch that works.
