Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hijacked ASUS Live Update software installs backdoors on countless PCs worldwide
#1
Exclamation 
Quote:A cybercriminal campaign focused on targeting the supply chain through the exploitation of ASUS Live Update software may have involved the installation of backdoors on over one million PCs.
 
On Monday, researchers from Kaspersky Labs said the attack was first detected in January 2019. It is believed that the campaign, dubbed Operation ShadowHammer, took place between June and November 2018 and has potentially compromised countless users -- despite there being only a small list of individuals the hackers wished to target.

Operation ShadowHammer leverages the ASUS Live Update Utility, which comes pre-installed on the majority of ASUS computers.
 
ASUS Live Update is intended for ensuring computer systems, such as drivers, apps, BIOS, and UEFI all receive upgrades and patches when they are due, but it is this valuable utility that cyberattackers have managed to compromise.
 
Kaspersky was able to track down over 57,000 of its own customers that unwittingly downloaded and installed the malicious software and while the cybersecurity firm is unable to provide direct figures of all those affected, the firm says that it estimates "the real scale of the problem is much bigger and is possibly affecting over a million users worldwide."

SOURCE: https://www.zdnet.com/article/supply-cha...-software/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply
#2
Exclamation 
ASUS releases fix for Live Update tool abused in ShadowHammer attack
 
Quote:ASUS Live Update version 3.6.8 contains the aforementioned fixes, the hardware vendor announced in a press release today.
 
The company said ASUS Live Update v3.6.8 "introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism."
 
ASUS also said it updated and strengthened its "server-to-end-user software architecture to prevent similar attacks from happening in the future."

SOURCE: https://www.zdnet.com/article/asus-relea...er-attack/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AMD Ryzen 9050 “Strix Halo” specs leaked
AMD Strix Point an...harlan4096 — 11:23
Audacity 3.5.1
Changes in 3.5.1: ...harlan4096 — 09:40
Waterfox G6.0.13
Waterfox G6.0.13​ ...harlan4096 — 09:39
Google Chrome 124.0.6367.78/.79
Google Chrome 124....harlan4096 — 09:38
Brave 1.65.122
Release Channel 1....harlan4096 — 09:36

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (49)steakelask
avatar (43)Termoplenka
avatar (49)Toligo

[-]
Online Staff
harlan4096's profile harlan4096
Administrator

>