Portable Bluetooth Speakers

Asus Pushes Meaning

Embark on a Quest with Asus Pushes Meaning

Step into a world where the focus is keenly set on Asus Pushes Meaning. Within the confines of this article, a tapestry of references to Asus Pushes Meaning awaits your exploration. If your pursuit involves unraveling the depths of Asus Pushes Meaning, you've arrived at the perfect destination.

Our narrative unfolds with a wealth of insights surrounding Asus Pushes Meaning. This is not just a standard article; it's a curated journey into the facets and intricacies of Asus Pushes Meaning. Whether you're thirsting for comprehensive knowledge or just a glimpse into the universe of Asus Pushes Meaning, this promises to be an enriching experience.

The spotlight is firmly on Asus Pushes Meaning, and as you navigate through the text on these digital pages, you'll discover an extensive array of information centered around Asus Pushes Meaning. This is more than mere information; it's an invitation to immerse yourself in the enthralling world of Asus Pushes Meaning.

So, if you're eager to satisfy your curiosity about Asus Pushes Meaning, your journey commences here. Let's embark together on a captivating odyssey through the myriad dimensions of Asus Pushes Meaning.

Showing posts sorted by relevance for query Asus Pushes Meaning. Sort by date Show all posts
Showing posts sorted by relevance for query Asus Pushes Meaning. Sort by date Show all posts

Asus Pushes Patch After Hackers Used Updates To Send Malware


Asus pushes patch after hackers used updates to send malware


Asus pushes patch after hackers used updates to send malware

Thousands of Asus computers were infected with malware from the company's own update tool, researchers from Kaspersky Lab said Monday.

The researchers discovered the attack in January, after hackers took over the Asus Live Update Utility to quietly install malware on devices. The hack was first reported by Motherboard.

On Tuesday, Asus said it's fixed the vulnerability in the latest version of its Live Update tool, meaning you'll have to trust the software to resolve the issue.

"Asus customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed," the company said in a statement.

The hack, which Kaspersky Lab is calling Operation ShadowHammer, went on between June and November 2018. Kaspersky Lab found that it affected more than 57,000 people using its products. The Russia-based cybersecurity company was only able to find those numbers for its own users, and estimates that the malware could affect more than a million Asus owners worldwide. 

Symantec, another cybersecurity company, found the same malware from Asus updates, and cited at least 13,000 computers affected by the attack. The company said that 80 percent of victims were consumers, while 20 percent were organizations.

The update tool is preinstalled on the majority of new Asus devices.

The attackers were able to infect devices without raising red flags because they used Asus' legitimate security certificate, which was hosted on the computer manufacturer's servers.

Asus is a Taiwan-based computer company, and one of the top consumer notebook vendors in the world, with millions of laptops worldwide. 

"The selected vendors are extremely attractive targets for APT [advanced persistent threat] groups that might want to take advantage of their vast customer base," Vitaly Kamluk, director of Kaspersky Lab's Global Research and Analysis Team, said in a statement.

Malware can arrive on your devices in a lot of ways -- downloading a file from an email, opening a PDF you shouldn't have or via browser-based attacks.

The hack on Asus' automatic update tool points to another kind of concern, in which people have to be worried about patches from the source itself as hackers seek to exploit a trusted relationship. Supply chain attacks are not new: In 2017, the popular software tool CCleaner was hijacked to install malware on millions of computers.

Distrust in automatic updates leads to another kind of threat, as many companies often rely on people to patch their devices to defend against new malware. The majority of computers infected with the WannaCry ransomware, for instance, were hit because they didn't install a security update issued in 2017.  

While it's capable of attacking millions, the malware had a specific set of targets, researchers found. Once it was installed, the backdoor checked the device's MAC address. If it matched one of the hacker's targets, it then installed another set of malware, researchers said.

Kaspersky Lab researchers said they identified more than 600 MAC addresses, and released a tool for people to check whether they were targeted by the attack. The cybersecurity company said it's notified Asus, and the investigation is ongoing.

Originally published March 25 at 7:16 a.m. PT.
Updated March 26 at 6:26 a.m. PT: Includes response from Asus.


Source

Tags:

Search This Blog

Menu Halaman Statis

close