Thursday, April 17, 2025
HomeComputer SecurityASUS Hacked - Hackers Hijacked ASUS Company servers to Inject the Malware...

ASUS Hacked – Hackers Hijacked ASUS Company servers to Inject the Malware in Millions of Users Computer

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals abused the worlds largest computer maker ASUS computers software update tool by hijacking the company server and install the malware.

ASUS live update tool contacts the ASUS update server periodically to see if any firmware or other software updates are available and the tool installed on laptops and other devices.

Attackers performed a sophisticated supply chain attack to compromise the company’s server and infect the user’s computer directly with the malware through automatic software update utility.

- Advertisement - Google News

ASUS software update utility is a pre-installed in every ASUS computers that helps to automatically update certain components such as BIOS, UEFI, drivers, and applications.

ASUS is the fifth largest PC maker in the world with 6% of the market capitalization that offers personal computer includes desktop computers, laptop computers, and netbooks etc.

The targetted supply chain attack on ASUS software update utility was initially discovered In January 2019, and the attack appears to be active since June to November 2018.

Infected Over Millions of ASUS users

Based on the Kaspersky lab analysis, since this supply chain attack took place nearly 6 months, the Malware infection via legitimate software updates infect nearly 1 million users and more around the world.

The malware targeting an unknown pool of users systems by searching their MAC address using the trojanized samples that contain a hardcoded MAC address to identify the specific targets.

Kaspersky researchers pulled out more than 600 unique MAC addresses from over 200 samples and they believe that the attack is even more sophisticated than the CCleaner supply chain attack and also this attack matches the dubbed Shadowpad Attack.

According to Kaspersky research, “The reason that it stayed undetected for so long is partly due to the fact that the trojanized updaters were signed with legitimate certificates (eg: “ASUSTeK Computer Inc.”). The malicious updaters were hosted on the official liveupdate01s.asus[.]com and liveupdate01.asus[.]com ASUS update servers.”

In this case, Motherboard reported that the updates come down from the Live Update ASUS server. They were trojanized, or malicious updates and they were signed by ASUS.

Most of the infected customers are belongs to Russia and also France, Germany, Italy, the U.S, Spain, Poland, U.K, Canada, Japan, etc.

In order to alert the ASUS users, Kaspersky created a site for users to check: https://shadowhammer.kaspersky.com/  that helps to determine if your device has been targeted by the ShadowHammer cyberattack by comparing the MAC addresses of all adapters hardcoded value in the malware.

Kaspersky yet to disclose the complete details of this sophisticated supply chain attack on ASUS computers and the full results and technical paper will be published during SAS 2019 conference in Singapore.

Learn : How to Analyze Advanced Malware – Complete Course Bundle

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...