Tuesday, May 28, 2024

ASUS Hacked – Hackers Hijacked ASUS Company servers to Inject the Malware in Millions of Users Computer

Cyber Criminals abused the worlds largest computer maker ASUS computers software update tool by hijacking the company server and install the malware.

ASUS live update tool contacts the ASUS update server periodically to see if any firmware or other software updates are available and the tool installed on laptops and other devices.

Attackers performed a sophisticated supply chain attack to compromise the company’s server and infect the user’s computer directly with the malware through automatic software update utility.

ASUS software update utility is a pre-installed in every ASUS computers that helps to automatically update certain components such as BIOS, UEFI, drivers, and applications.

ASUS is the fifth largest PC maker in the world with 6% of the market capitalization that offers personal computer includes desktop computers, laptop computers, and netbooks etc.

The targetted supply chain attack on ASUS software update utility was initially discovered In January 2019, and the attack appears to be active since June to November 2018.

Infected Over Millions of ASUS users

Based on the Kaspersky lab analysis, since this supply chain attack took place nearly 6 months, the Malware infection via legitimate software updates infect nearly 1 million users and more around the world.

The malware targeting an unknown pool of users systems by searching their MAC address using the trojanized samples that contain a hardcoded MAC address to identify the specific targets.

Kaspersky researchers pulled out more than 600 unique MAC addresses from over 200 samples and they believe that the attack is even more sophisticated than the CCleaner supply chain attack and also this attack matches the dubbed Shadowpad Attack.

According to Kaspersky research, “The reason that it stayed undetected for so long is partly due to the fact that the trojanized updaters were signed with legitimate certificates (eg: “ASUSTeK Computer Inc.”). The malicious updaters were hosted on the official liveupdate01s.asus[.]com and liveupdate01.asus[.]com ASUS update servers.”

In this case, Motherboard reported that the updates come down from the Live Update ASUS server. They were trojanized, or malicious updates and they were signed by ASUS.

Most of the infected customers are belongs to Russia and also France, Germany, Italy, the U.S, Spain, Poland, U.K, Canada, Japan, etc.

In order to alert the ASUS users, Kaspersky created a site for users to check: https://shadowhammer.kaspersky.com/  that helps to determine if your device has been targeted by the ShadowHammer cyberattack by comparing the MAC addresses of all adapters hardcoded value in the malware.

Kaspersky yet to disclose the complete details of this sophisticated supply chain attack on ASUS computers and the full results and technical paper will be published during SAS 2019 conference in Singapore.

Learn : How to Analyze Advanced Malware – Complete Course Bundle

Website

Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles