Asus software updates were used to spread malware, security group says [www.theverge.com]
Hackers took over Asus updates to send you malware, researchers say [www.cnet.com]
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers [motherboard.vice.com]
Hackers dropped a secret backdoor in Asus’ update software [techcrunch.com]
ASUS Live Update Utility cracked, installs ShadowHammer backdoor on 1M PCs, but only 600 targeted [www.computerworld.com]
"... the hackers did seem to target specific Asus customers: the malware included special instructions for 600 systems, to be identified by specific MAC addresses."
— Paul Dokas (@pauldokas) March 25, 2019
I would love to know who owns those 600 systems and details about the custom payload.https://t.co/EfC7cljgrw
Asus software updates were used to spread malware, security group says https://t.co/K3Bpsvy3Ij pic.twitter.com/rtrhn5mfHS
— The Verge (@verge) March 25, 2019
Hackers Took Over Asus Updates To Send You Malware, Researchers Say https://t.co/xUqV8xMUWt
— Nicolas Krassas (@Dinosn) March 25, 2019
Hackers Took Over Asus Updates To Send You Malware, Researchers Say https://t.co/U8wQksOyV9 #news
— packet storm (@packet_storm) March 25, 2019
ASUS, one of world’s largest computer makers, installed backdoor on thousands of customer computers last yr after hackers compromised its software update tool. The file was signed w/ ASUS digital certificates to make it look like authentic software update. https://t.co/ni17IEN6Tq
— Kim Zetter (@KimZetter) March 25, 2019
This is absolutely insane. Hackers broke into an update server for laptop maker ASUS. The hackers then used it to push malware that looked like a legitimate ASUS update to thousands of computers. A golden supply chain attack leveraging update mechanisms https://t.co/tcq74Df6vg pic.twitter.com/AbRMhgteiq
— Joseph Cox (@josephfcox) March 25, 2019
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computershttps://t.co/2voRyS2ZxL
— Florian Roth (@cyb3rops) March 25, 2019
Kaspersky - Operation ShadowHammerhttps://t.co/RqeommRn0E#BARIUM #Winnti #Asus
Asus Live Updater was used in a big supply chain attack we dubbed Operation #ShadowHammer. We estimate this may have affected over 1 million computer users between June and Nov 2018. https://t.co/jTij3NwpSs
— Costin Raiu (@craiu) March 25, 2019
Holy supply chain attack batman!@kaspersky found that attackers compromised ASUS and used their live update tool to install digitally signed malware, disguised as updates. Zero trust computing is starting to make more and more practical sense.https://t.co/vJDDLpljWZ
— Jake Williams (@MalwareJake) March 25, 2019
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers https://t.co/CbQo2ur0BO pic.twitter.com/oP6flarSQA
— Graham Cluley (@gcluley) March 25, 2019
ASUS, what are you doing https://t.co/tcq74Df6vg pic.twitter.com/g1OayN2UX5
— Joseph Cox (@josephfcox) March 25, 2019
Great scoop by @KimZetter — been chasing this one myself for some time. https://t.co/GsywWoIUvc
— Zack Whittaker (@zackwhittaker) March 25, 2019
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers https://t.co/DU9K5HJUco via @motherboard
— Adam Levin (@Adam_K_Levin) March 25, 2019
Not much more I can add beyond confirming most of @kimzetter's incredible reporting (she had a lot more than I ever did). Symantec also provided me intel, saying some 13,000 of its customers were affected. https://t.co/ZqrtZoNb1n
— Zack Whittaker (@zackwhittaker) March 25, 2019
Just in: Symantec data breaks out those affected by the Asus backdoor. "80 percent of victims were consumers and 20 percent were from organizations." The attacker and their motivation is "unclear at this time."
— Zack Whittaker (@zackwhittaker) March 25, 2019
More: https://t.co/FiO0kwpryN pic.twitter.com/VMbHJojyol