Thursday, October 10, 2024
HomeComputer SecurityASUS Hacked - Hackers Hijacked ASUS Company servers to Inject the Malware...

ASUS Hacked – Hackers Hijacked ASUS Company servers to Inject the Malware in Millions of Users Computer

Published on

Cyber Criminals abused the worlds largest computer maker ASUS computers software update tool by hijacking the company server and install the malware.

ASUS live update tool contacts the ASUS update server periodically to see if any firmware or other software updates are available and the tool installed on laptops and other devices.

Attackers performed a sophisticated supply chain attack to compromise the company’s server and infect the user’s computer directly with the malware through automatic software update utility.

- Advertisement - EHA

ASUS software update utility is a pre-installed in every ASUS computers that helps to automatically update certain components such as BIOS, UEFI, drivers, and applications.

ASUS is the fifth largest PC maker in the world with 6% of the market capitalization that offers personal computer includes desktop computers, laptop computers, and netbooks etc.

The targetted supply chain attack on ASUS software update utility was initially discovered In January 2019, and the attack appears to be active since June to November 2018.

Infected Over Millions of ASUS users

Based on the Kaspersky lab analysis, since this supply chain attack took place nearly 6 months, the Malware infection via legitimate software updates infect nearly 1 million users and more around the world.

The malware targeting an unknown pool of users systems by searching their MAC address using the trojanized samples that contain a hardcoded MAC address to identify the specific targets.

Kaspersky researchers pulled out more than 600 unique MAC addresses from over 200 samples and they believe that the attack is even more sophisticated than the CCleaner supply chain attack and also this attack matches the dubbed Shadowpad Attack.

According to Kaspersky research, “The reason that it stayed undetected for so long is partly due to the fact that the trojanized updaters were signed with legitimate certificates (eg: “ASUSTeK Computer Inc.”). The malicious updaters were hosted on the official liveupdate01s.asus[.]com and liveupdate01.asus[.]com ASUS update servers.”

In this case, Motherboard reported that the updates come down from the Live Update ASUS server. They were trojanized, or malicious updates and they were signed by ASUS.

Most of the infected customers are belongs to Russia and also France, Germany, Italy, the U.S, Spain, Poland, U.K, Canada, Japan, etc.

In order to alert the ASUS users, Kaspersky created a site for users to check: https://shadowhammer.kaspersky.com/  that helps to determine if your device has been targeted by the ShadowHammer cyberattack by comparing the MAC addresses of all adapters hardcoded value in the malware.

Kaspersky yet to disclose the complete details of this sophisticated supply chain attack on ASUS computers and the full results and technical paper will be published during SAS 2019 conference in Singapore.

Learn : How to Analyze Advanced Malware – Complete Course Bundle

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

In a new campaign that is aimed at users who speak Russian, the modular...

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its...