{"id":58758,"date":"2025-06-04T16:44:00","date_gmt":"2025-06-04T16:44:00","guid":{"rendered":"http:\/\/647963d9-8abd-4f87-b26c-682085f3cd10"},"modified":"2025-06-04T16:44:00","modified_gmt":"2025-06-04T16:44:00","slug":"your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/","title":{"rendered":"Your Asus router may be part of a botnet &#8211; here&#8217;s how to tell and what to do"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/2516027adc0547f80ce6b513ef4f6839b82561f7\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=768\" alt=\"asus-router-2\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3d3b110bcebc0a95ff0859959a37094455cd526f\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1024\" alt=\"asus-router-2\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280\" alt=\"asus-router-2\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280\" alt=\"asus-router-2\" width=\"1280\" height=\"737.28\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Elyse Betters Picaro \/ ZDNET<\/span><\/figcaption><\/figure>\n<p>Do you own an Asus router? If so, your device may have been one of thousands compromised in a large campaign waged by cybercriminals looking to exploit it. In a <a href=\"https:\/\/www.greynoise.io\/blog\/stealthy-backdoor-campaign-affecting-asus-routers\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">blog post published Wednesday<\/a>, security firm GreyNoise revealed that the attack was staged by what it suggests is &#8220;a well-resourced and highly capable adversary.&#8221;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/massive-data-breach-exposes-184-million-passwords-for-google-microsoft-facebook-and-more\/\">Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more<\/a><\/strong><\/p>\n<p>To gain initial access, the attackers used brute-force login techniques and two different methods to bypass the built-in authentication. They&#8217;ve also been able to exploit certain vulnerabilities not yet assigned official <a href=\"https:\/\/www.cve.org\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">CVE numbers<\/a>. Once they&#8217;d accessed the router, they were able to run arbitrary system commands by exploiting a known security flaw identified as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-39780\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">CVE-2023-39780<\/a>.<\/p>\n<p>Though no malware was actually installed, the attackers certainly left their mark. <\/p>\n<h2>More than 9,000 Asus routers affected<\/h2>\n<p>By using built-in Asus settings, they were able to set up <a href=\"https:\/\/www.zdnet.com\/article\/what-is-ssh-and-how-do-you-use-it-here-are-the-secure-shell-basics-you-need-to-know\/\">SSH access<\/a>, a secure way to connect to and control a remote device. They also installed a backdoor to return easily to the router&#8217;s firmware without worrying about authentication. The backdoor was stored in non-volatile memory (NVRAM), which meant it couldn&#8217;t be removed by rebooting the router or updating its firmware. To avoid being caught, the criminals even disabled logging, which would otherwise record their access. <\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/why-no-small-business-is-too-small-for-hackers-and-8-security-best-practices-for-smbs\/\"><strong>Why no small business is too small for hackers &#8211; and 8 security best practices for SMBs<\/strong><\/a><\/p>\n<p>Based on <a href=\"https:\/\/search.censys.io\/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=%28services.port%3D53282%29+and+%28services.software.vendor%3D%60Asus%60+or+services.software.vendor%3D%60ASUS%60%29\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">data from internet scanner Censys<\/a>, more than 9,000 Asus routers are affected, and that number is growing. However, GreyNoise said that over the past three months, it witnessed only 30 related requests to access the affected routers. That seems to be a sign that the campaign is moving along slowly and quietly. <\/p>\n<p>If no malware is installed, what&#8217;s the goal behind the attack? <\/p>\n<p>&#8220;This appears to be part of a stealth operation to assemble a distributed network of backdoor devices &#8212; potentially laying the groundwork for a future botnet,&#8221; GreyNoise said in its post.<\/p>\n<p>And who&#8217;s behind it?<\/p>\n<p>&#8220;The tactics used in this campaign &#8212; stealthy initial access, use of built-in system features for persistence, and careful avoidance of detection &#8212; are consistent with those seen in advanced, long-term operations, including activity associated with advanced persistent threat (APT) actors and operational relay box (ORB) networks. While GreyNoise has made no attribution, the level of tradecraft suggests a well-resourced and highly capable adversary.&#8221; <\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/your-old-router-could-be-a-security-threat-heres-why-and-what-to-do\/\"><strong>Your old router could be a security threat &#8211; here&#8217;s why and what to do<\/strong><\/a><\/p>\n<p>The language used by GreyNoise, particularly the reference to APTs, suggests a nation-state or attackers working on behalf of a hostile government. Though GreyNoise didn&#8217;t cite any particular adversary, such attacks have been <a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/nation-state-cyber-actors\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">attributed to different countries<\/a>, including China, Russia, North Korea, and Iran.<\/p>\n<p>Using its AI-powered payload analysis tool Sift and its observation grid, GreyNoise discovered the attack on March 18. But the firm said it waited until now to disclose it publicly so it could have time to consult with its government and industry partners.<\/p>\n<p>&#8220;In the past few years, networking gear especially for the home, SOHO, and SMB market segments, has had a rough go with attackers increasingly targeting these devices,&#8221; John Bambenek, president at cybersecurity firm Bambenek Consulting, told ZDNET. &#8220;The risk of the household being compromised is minimal, they&#8217;ll simply have their router be used to launch attacks on other parties (though they might start experiencing more captchas when they engage in their routine internet use). Sophisticated attackers are going for these devices because they intend to do something, and it&#8217;ll be more than cryptomining.&#8221;<\/p>\n<p><!----><\/p>\n<h2>What should you do if you own an Asus router?<\/h2>\n<p>To see if your device has been compromised, log in to the router&#8217;s firmware. Look for the &#8220;Enable SSH&#8221; option under the Service or Administration settings. If your router was caught in the campaign, the settings will show that someone can log in to it using SSH over port 53282 with a truncated SSH public key of: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ&#8230; <\/p>\n<p>Normally, updating the firmware would solve the problem, especially since Asus fixed the CVE-2023-39780 flaw with its latest firmware update. If your router hasn&#8217;t been infected, be sure to update the firmware ASAP. But if your router has already been compromised, the backdoor remains even after an update. <\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/home-and-office\/networking\/how-to-easily-add-a-backup-internet-connection-to-your-home-office-and-why-you-should\/\"><strong>How to easily add a backup internet connection to your home office &#8211; and why you should<\/strong><\/a><\/p>\n<p>In that case, Asus advises you to remove or disable the SSH entry. You&#8217;ll also want to block the following four IP addresses: 101.99.91.151, 101.99.94.173, 79.141.163.179, and 111.90.146.237. Finally, you may want to factory reset your router and manually reconfigure it to make sure no traces of the backdoor remain.<\/p>\n<p>&#8220;For the overwhelming majority of people, turning off external admin access to the devices (whether SSH or HTTPS) makes good sense,&#8221; Bambenek said. &#8220;In fact, that should be the default setting as remarkably few people ever access the administrative interfaces in the first place.&#8221;<\/p>\n<p><em>Get the morning&#8217;s top stories in your inbox each day with our <\/em><a href=\"https:\/\/www.zdnet.com\/newsletters\/\"><strong><em>Tech Today newsletter.<\/em><\/strong><\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals have hacked into thousands of Asus routers, possibly as a prelude to a botnet attack, says a security firm.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-58758","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Asus router may be part of a botnet - here&#039;s how to tell and what to do 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Asus router may be part of a botnet - here&#039;s how to tell and what to do 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-04T16:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your Asus router may be part of a botnet &#8211; here&#8217;s how to tell and what to do\",\"datePublished\":\"2025-06-04T16:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/\"},\"wordCount\":880,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\\\/2025\\\/05\\\/29\\\/2122a1bf-e53b-4293-81e1-f936db549912\\\/asus-router-2.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/\",\"name\":\"Your Asus router may be part of a botnet - here's how to tell and what to do 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\\\/2025\\\/05\\\/29\\\/2122a1bf-e53b-4293-81e1-f936db549912\\\/asus-router-2.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2025-06-04T16:44:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\\\/2025\\\/05\\\/29\\\/2122a1bf-e53b-4293-81e1-f936db549912\\\/asus-router-2.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\\\/2025\\\/05\\\/29\\\/2122a1bf-e53b-4293-81e1-f936db549912\\\/asus-router-2.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Asus router may be part of a botnet &#8211; here&#8217;s how to tell and what to do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Asus router may be part of a botnet - here's how to tell and what to do 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/","og_locale":"en_US","og_type":"article","og_title":"Your Asus router may be part of a botnet - here's how to tell and what to do 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-06-04T16:44:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your Asus router may be part of a botnet &#8211; here&#8217;s how to tell and what to do","datePublished":"2025-06-04T16:44:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/"},"wordCount":880,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/","url":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/","name":"Your Asus router may be part of a botnet - here's how to tell and what to do 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280","datePublished":"2025-06-04T16:44:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/c71ec584233ebc11aa3eb18c87e1e042d0f50c04\/2025\/05\/29\/2122a1bf-e53b-4293-81e1-f936db549912\/asus-router-2.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-asus-router-may-be-part-of-a-botnet-heres-how-to-tell-and-what-to-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Asus router may be part of a botnet &#8211; here&#8217;s how to tell and what to do"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58758"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58758\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}