Home / Malware / Asus Live Update Pushed Malware to 1 Million PCs – ExtremeTech

Asus Live Update Pushed Malware to 1 Million PCs – ExtremeTech

This site may earn affiliate commissions from the links on this page. Terms of use.

Asus sells a lot of laptops, and Kaspersky says a shocking number of those devices were infected with malware last year. The sketchy code didn’t get on those machines via a hacked website or malicious browser extension. No, Asus itself pushed the malware to hundreds of thousands of machines after attackers gained control of the company’s update servers.

The attack, dubbed ShadowHammer, affected many thousands of computers, but it was a highly targeted attack. Kaspersky became aware of the scheme in January when it updated its scanning tools with supply-chain detection technology. A supply-chain attack involves bundling malware with systems when they are manufactured, sold, or via vendor update systems. ShadowHammer went undetected for so long because it didn’t have any immediate effect on most of the infected systems. The attackers were looking for about 600 very specific machines.

According to Kaspersky, the malware arrived on machines for about five months last year, from June to November. Like everything else distributed via the Asus Live Update tool, the programs were signed by Asus and automatically trusted by the system. The program, called “ASUSFourceUpdater.exe,” masqueraded as an update to the Live Update tool, but it was actually an older version of the program trojanized with malware. Russia, Germany, and France had by far the most ShadowHammer infections, followed by Italy and the US.

After installation, the malware scanned the computer’s unique network card MAC address, looking for a match on its embedded list of 600 systems. If the program found a match, it would reach out to a command and control server to download additional malware to take over the computer. So, the attackers knew who they were going after and cast the widest net possible in an attempt to catch them. Kaspersky researchers know the MAC addresses targeted, but we don’t know who owned those systems or how the attackers learned their hardware IDs.

Kaspersky believes those behind ShadowHammer also perpetrated the CCleaner attack 2017. That malware campaign also targeted Asus and could be how the attackers gained access to the Asus servers. Kaspersky will publish a full report on the malware soon, but there’s a summary post already available. Researchers have also put up a page where you can input your MAC address to see if it was on the target list. Kaspersky’s security tools will now detect and remove ShadowHammer as well.

Now read:


Source link

Check Also

ISRO confirms it was alerted about DTrack malware during Chandrayaan 2, says it had no impact – Firstpost

tech2 News StaffNov 10, 2019 16:31:45 IST ISRO confirms that it was alerted to a …

Leave a Reply

Your email address will not be published. Required fields are marked *