Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Scythe Mugen 5 Rev.C CPU Cooler review
be quiet Pure Loop 2 FX 280mm LCS review
HP FX900 1 TB NVMe Review
Scythe FUMA2 Rev.B CPU Cooler review
SK Hynix Platinum P41 2TB M.2 NVMe SSD Review
Corsair K70 RGB PRO Mini Wireless review
MSI MPG A1000G - 1000W PSU Review
Goodram IRDM PRO M.2 SSD 2 TB NVMe SSD Review
Samsung T7 Shield Portable 1TB USB SSD review
DeepCool LS720 (LCS) review

New Downloads
Download Intel network driver package 27.6
AMD Radeon Software Adrenalin 22.8.1 driver download
Prime95 download version 30.8 build 16
Memtest86 9.5 download
Intel ARC graphics Driver Download Version: 30.0.101.1743
GeForce 516.94 WHQL driver download
Display Driver Uninstaller Download version 18.0.5.4
FurMark Download v1.31
Intel HD graphics Driver Download Version: 31.0.101.3222
AMD Radeon Software Adrenalin 22.7.1 driver download


New Forum Topics
Intel Arc and Xe iGPUs Need to emulate support for DirectX 9 Through a Wrapper NVIDIA GeForce 516.94 WHQL driver download & Discussion Guru3D Thermal Paste Roundup - Round 2 (2021) RDNA2 RX6000 Series Owners Thread, Tests, Mods, BIOS & Tweaks ! [Skin] MSI Modern Green by Polo6RGTI (Improved by amymor + Extra colorful version) Ray tracing. Whats the trick? Slow SSD write speed Check out the beautiful demo of Unity Lion - runs at 4K @ 30FPS AMD Software: Adrenalin Edition 22.8.1- Driver download and discussion Is Windows 11 "Ghost Spectre" really an improvement for gaming?




Guru3D.com » News » Hackers Hijacked ASUS Software Updates and Installed Backdoors on Many PC's and Laptops

Hackers Hijacked ASUS Software Updates and Installed Backdoors on Many PC's and Laptops

by Hilbert Hagedoorn on: 03/25/2019 05:42 PM | source: motherboard.vice.com | 26 comment(s)
Hackers Hijacked ASUS Software Updates and Installed Backdoors on Many PC's and Laptops

Asus Live Update software installed on laptops and PCs from the Taiwanese manufacturer contained a backdoor between June and November 2018. Malicious folks this way could install malware on specific systems. The malware was targeted at specific mac addresses though?

Kaspersky discovered the presence of the backdoor in January and informed Asus at the end of that month. According to security researchers, the update software was infected with a backdoor in the timeframe of June up-to November 2018. Kaspersky has named this attack 'ShadowHammer' and has put a tool online for users to check whether their Asus laptop contains the backdoor.

They also created a page on which users can verify if their mac address is included on the list of targets. ASUS is believed to have pushed this malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company's server and used it to push the malware to machines. From the report posted at motherboard.vice.com: 

Researchers at cybersecurity firm Kaspersky Lab say that ASUS, one of the world's largest computer makers, was used to unwittingly to install a malicious backdoor on thousands of its customers' computers last year after attackers compromised a server for the company's live software update tool. The malicious file was signed with legitimate ASUS digital certificates to make it appear to be an authentic software update from the company, Kaspersky Lab says. ASUS, a multi-billion dollar computer hardware company based in Taiwan that manufactures desktop computers, laptops, mobile phones, smart home systems, and other electronics, was pushing the backdoor to customers for at least five months last year before it was discovered, according to new research from the Moscow-based security firm.

The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems. The malware searched for targeted systems through their unique MAC addresses. Once on a system, if it found one of these targeted addresses, the malware reached out to a command-and-control server the attackers operated, which then installed additional malware on those machines. Kaspersky Lab said it uncovered the attack in January after adding a new supply-chain detection technology to its scanning tool to catch anomalous code fragments hidden in legitimate code or catch code that is hijacking normal operations on a machine. The company plans to release a full technical paper and presentation about the ASUS attack, which it has dubbed ShadowHammer, next month at its Security Analyst Summit in Singapore.







« Download: GeForce 419.67 WHQL · Hackers Hijacked ASUS Software Updates and Installed Backdoors on Many PC's and Laptops · Grab for free: The Elder Scrolls III: Morrowind »

6 pages 1 2 3 4 5 6


gdmaclew
Member



Posts: 50
Joined: 2016-07-01

#5654321 Posted on: 03/26/2019 04:26 PM
The only problem with the DIAGNOSIS TOOL is that even if you have an ASUS motherboard it gives you an error message - "only for ASUS machine!" The exclamation point it theirs not mine.

INSTG8R
Senior Member



Posts: 1659
Joined: 2005-03-18

#5654327 Posted on: 03/26/2019 04:34 PM
The only problem with the DIAGNOSIS TOOL is that even if you have an ASUS motherboard it gives you an error message - "only for ASUS machine!" The exclamation point it theirs not mine.

This only affected notebooks so I’m not surprised by the error.

alanm
Senior Member



Posts: 11339
Joined: 2004-05-10

#5654361 Posted on: 03/26/2019 06:31 PM
“Supply chain attacks are in the ‘big deal’ category and are a sign of someone who is careful about this and has done some planning,”..... “They wanted to get into very specific targets and they already knew in advance their network card MAC address, which is quite interesting.” .... as well as using digital certificates.

I'll bet some spy agency, CIA, Mossad, Russian intel, etc, are involved. The capabilities and resources needed to pull this sort of thing off are just not what you would see from your regular run of the mill hackers

BetA
Senior Member



Posts: 4412
Joined: 2008-03-03

#5654388 Posted on: 03/26/2019 07:47 PM
updated Pics in first post...









Fox2232
Senior Member



Posts: 11809
Joined: 2012-07-20

#5654403 Posted on: 03/26/2019 08:22 PM
Wait a minute....

'But the US-based security firm Symantec confirmed the Kaspersky findings on Friday after being asked by Motherboard to see if any of its customers also received the malicious download. The company is still investigating the matter but said in a phone call that at least 13,000 computers belonging to Symantec customers were infected with the malicious software update from ASUS last year.

So Symantec is saying they MISSED this or they caught it and did not report a compromised server(s) to ASUS?
Chance is that they detected infection, but not infection vector.

6 pages 1 2 3 4 5 6


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2022