Hackers Hijacked ASUS Software Updates and Installed Backdoors on Many PC's and Laptops
Asus Live Update software installed on laptops and PCs from the Taiwanese manufacturer contained a backdoor between June and November 2018. Malicious folks this way could install malware on specific systems. The malware was targeted at specific mac addresses though?
Kaspersky discovered the presence of the backdoor in January and informed Asus at the end of that month. According to security researchers, the update software was infected with a backdoor in the timeframe of June up-to November 2018. Kaspersky has named this attack 'ShadowHammer' and has put a tool online for users to check whether their Asus laptop contains the backdoor.
They also created a page on which users can verify if their mac address is included on the list of targets. ASUS is believed to have pushed this malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company's server and used it to push the malware to machines. From the report posted at motherboard.vice.com:
Researchers at cybersecurity firm Kaspersky Lab say that ASUS, one of the world's largest computer makers, was used to unwittingly to install a malicious backdoor on thousands of its customers' computers last year after attackers compromised a server for the company's live software update tool. The malicious file was signed with legitimate ASUS digital certificates to make it appear to be an authentic software update from the company, Kaspersky Lab says. ASUS, a multi-billion dollar computer hardware company based in Taiwan that manufactures desktop computers, laptops, mobile phones, smart home systems, and other electronics, was pushing the backdoor to customers for at least five months last year before it was discovered, according to new research from the Moscow-based security firm.
The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems. The malware searched for targeted systems through their unique MAC addresses. Once on a system, if it found one of these targeted addresses, the malware reached out to a command-and-control server the attackers operated, which then installed additional malware on those machines. Kaspersky Lab said it uncovered the attack in January after adding a new supply-chain detection technology to its scanning tool to catch anomalous code fragments hidden in legitimate code or catch code that is hijacking normal operations on a machine. The company plans to release a full technical paper and presentation about the ASUS attack, which it has dubbed ShadowHammer, next month at its Security Analyst Summit in Singapore.
Senior Member
Posts: 1659
Joined: 2005-03-18
This only affected notebooks so I’m not surprised by the error.
Senior Member
Posts: 11339
Joined: 2004-05-10
“Supply chain attacks are in the ‘big deal’ category and are a sign of someone who is careful about this and has done some planning,”..... “They wanted to get into very specific targets and they already knew in advance their network card MAC address, which is quite interesting.” .... as well as using digital certificates.
I'll bet some spy agency, CIA, Mossad, Russian intel, etc, are involved. The capabilities and resources needed to pull this sort of thing off are just not what you would see from your regular run of the mill hackers
Senior Member
Posts: 4412
Joined: 2008-03-03
updated Pics in first post...


Senior Member
Posts: 11809
Joined: 2012-07-20
Wait a minute....
'But the US-based security firm Symantec confirmed the Kaspersky findings on Friday after being asked by Motherboard to see if any of its customers also received the malicious download. The company is still investigating the matter but said in a phone call that at least 13,000 computers belonging to Symantec customers were infected with the malicious software update from ASUS last year.
So Symantec is saying they MISSED this or they caught it and did not report a compromised server(s) to ASUS?
Chance is that they detected infection, but not infection vector.
Member
Posts: 50
Joined: 2016-07-01
The only problem with the DIAGNOSIS TOOL is that even if you have an ASUS motherboard it gives you an error message - "only for ASUS machine!" The exclamation point it theirs not mine.