![]() (Kaspersky managed it, though, which is why disclosures like these are also thinly veiled advertisements.) The company said it detected the malware on 57,000 devices but estimated that 1 million were affected. ![]() It also had the same file size as the official version of the utility.Īll those precautions made the malicious version of the Asus Live Update Utility incredibly difficult to detect. This malicious version of the tool was hosted on the Asus update server and signed with a legitimate certificate. The researchers said that someone modified the Asus Live Update Utility, added a back door and then distributed it via official channels. The security firm said this attack, which it dubbed Operation ShadowHammer, “seems to be one of the biggest supply-chain incidents ever,” after the CCleaner attack of 2017. Kaspersky Labs revealed today that an unidentified threat actor modified the Asus Live Update Utility to gain access to target devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |