Asus Live Update Utility 3.6 8
Criminals Modified ASUS Alive Update Utility to Deliver Backdoor to 1M People
March 26, 2019
Digital criminals modified the ASUS Alive Update Utility to deliver a backstairs to approximately ane one thousand thousand people.
According to a blog post published on Securelist , Kaspersky Lab commencement detected the supply concatenation attack named "Operation ShadowHammer" on 19 Jan. Bad actors staged this campaign between June 2018 and November 2018 against the ASUS Alive Update Utility, software which comes pre-installed on all ASUS machines. This tool enables ASUS computers to automatically receive updates for BIOS, UEFI and other applications from the manufacturer.
Kaspersky Lab counted 57,000 users of its security software who installed the backdoored version of the ASUS Alive Update Utility distributed in this campaign. The Russian security firm couldn't go far at a total number of users afflicted by the attack using its numbers alone. Using what it saw, however, it postulated that Performance ShadowHammer infected more than a million users.
Following its discovery, the security company notified ASUS about the attack campaign on 31 Jan. The reckoner manufacturer responded by acknowledging the events of Functioning ShadowHammer on 26 March—a day after Kaspersky Lab's written report came out. Every bit quoted in the visitor'southward statement :
A small number of devices have been implanted with malicious lawmaking through a sophisticated attack on our Alive Update servers in an effort to target a very small and specific user group. ASUS customer service has been reaching out to affected users and providing aid to ensure that the security risks are removed.
ASUS also explained that it'southward implemented several security measures to forestall similar incidents from happening again as well as issued a prepare in version 3.half-dozen.8 of the Alive Update software. This updated version is available for download here .
Looking dorsum at its research, Kaspersky Lab figures that the campaign was so difficult to notice because the trojanized updaters came with signed legitimate certificates from ASUS. These code-signing certificates are important for companies in that they help identify which updates and machines should exist trusted. Unfortunately, it's this very same functionality that makes code-signing certificates of import targets for digital attackers.
Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, knows this preference among digital criminals all too well:
Hackers continue to exploit the power of machine identities every day. Like Stuxnet, attackers steal or take over code-signing certificates to make their malware trusted. Everything from Telsa cars to Boeing airplanes to your laptop use code signing to institute which apps, drivers and updates are trusted. This is the extreme power that hackers want to be completely trusted and it an even allow them to evade threat protection systems.
The trouble, Bocek explains, is that the protection of code-signing processes unremarkably falls to developers who are not prepared to defend confronting attacks. At the aforementioned time, well-nigh security teams may non even know their developers are using lawmaking signing. This lack of visibility is concerning, as code-signing certificates are likely to abound exponentially over the next few years amid the rise of mobile apps, DevOps and IoT.
Given these risks, organizations need to invest in a solution that can assist them inventory their encryption avails and monitor them for signs of corruption.
How well protected are your code-signing and other digital certificates?
Related posts
- Attackers Misused Code-Signing Certificates of Taiwanese Companies to Spread Plead Malware
- Code Signing Certificates: A Night Web Best Seller
- Crypto Mining, Code Signing Compromise: Are Your Certificates Prophylactic?
- The CCleaner Compromise: Was a Code Signing Document the Culprit?
Like this blog? Nosotros think you will dearest this.
Featured Blog The Eliminating Abusive and Rampant Neglect of Interactive T Read More
EARN It Human activity Is Back so Is Argue Over End-To-End Encryption
Yous might also like
TLS Machine Identity Direction for Dummies
eBook
CIO Written report: Document-Related Outages Go along to Plague Organizations
White Paper
About the author
Asus Live Update Utility 3.6 8,
Source: https://www.venafi.com/blog/criminals-modified-asus-live-update-utility-deliver-backdoor-1m-people
Posted by: orourkealateve.blogspot.com

0 Response to "Asus Live Update Utility 3.6 8"
Post a Comment