Thousands of ASUS Routers Compromised in Global Cyberattack
A stealthy cyberattack has compromised over 9,000 ASUS routers worldwide, granting attackers persistent control over these devices, as discovered by cybersecurity firm GreyNoise.

The attackers employed advanced techniques to infiltrate ASUS routers, achieving access that persists even after device reboots and firmware updates. By exploiting known vulnerabilities and leveraging legitimate configuration features, they maintained control without deploying traditional malware, making detection exceedingly difficult.
GreyNoise’s investigation revealed that the attackers used a combination of authentication bypasses and system feature abuses to establish a durable foothold. This level of sophistication suggests involvement by a well-resourced and highly capable adversary, possibly linked to advanced persistent threat (APT) groups.
The compromised routers appear to be part of a larger effort to assemble a distributed network of backdoor devices, potentially forming a botnet. Such networks can be used for various malicious activities, including launching distributed denial-of-service (DDoS) attacks, distributing malware, or facilitating espionage operations.
This incident is reminiscent of previous campaigns like TheMoon and Cyclops Blink, which also targeted ASUS routers to create proxy networks for cybercriminal activities.
ASUS has acknowledged the vulnerabilities exploited in this campaign and has released firmware updates to address them. Users are strongly advised to:
- Perform a full factory reset of their ASUS routers.
- Manually reconfigure the device settings.
- Install firmware updates released on or after May 27, 2025.
- Disable remote management features if not needed.

Cybersecurity experts emphasize the importance of regular firmware updates, strong authentication practices, and disabling unnecessary remote access features to safeguard against such threats.
Want to see more of our stories on Google?
P.S. Want to keep this site truly independent? Support us by buying us a beer, treating us to a coffee, or shopping through Amazon here. Links in this post are affiliate links, so we earn a tiny commission at no charge to you. Thanks for supporting independent Canadian media!
I wonder if custom firmwares like Merlin are affected too.
Likely, as the base is still Asus code and this is a low level vulnerability exploit. Better to avoid remote management access at all cost – and that's not just for this particular case.
Likely, as the base is still Asus code and this is a low level vulnerability exploit. Better to avoid remote management access at all cost – and that's not just for this particular case.
"achieving access that persists even after device reboots and firmware updates", sooo, what's the point of advising these users to update their firmware? Wouldn't the router need to be thrown out if the router is compromised? I would imagine only unaffected users would benefit, but how would you know if you were affected if "detection [is] exceedingly difficult." Seems to me that the only way to be sure is to throw them out.
Full factory reset, then firmware update
I guess the only remaining problem is hoping you don't get re-compromised in the short, but significant time while you're downloading the new firmware! Perhaps installing the firmware via USB stick and keeping the router offline during the update is the way to go.
Zdnet has more details around how to determine if the router has been targeted and what to do https://www.zdnet.com/article/your-asus-router-may-be-compromised-heres-how-to-tell-and-what-to-do/