Asus Live Update Pushed Malware to 1 Million PCs

Asus Live Update Pushed Malware to 1 Million PCs

Asus sells a lot of laptops, and Kaspersky says a shocking number of those devices were infected with malware last year. The sketchy code didn’t get on those machines via a hacked website or malicious browser extension. No, Asus itself pushed the malware to hundreds of thousands of machines after attackers gained control of the company’s update servers.

The attack, dubbed ShadowHammer, affected many thousands of computers, but it was a highly targeted attack. Kaspersky became aware of the scheme in January when it updated its scanning tools with supply-chain detection technology. A supply-chain attack involves bundling malware with systems when they are manufactured, sold, or via vendor update systems. ShadowHammer went undetected for so long because it didn’t have any immediate effect on most of the infected systems. The attackers were looking for about 600 very specific machines.

According to Kaspersky, the malware arrived on machines for about five months last year, from June to November. Like everything else distributed via the Asus Live Update tool, the programs were signed by Asus and automatically trusted by the system. The program, called “ASUSFourceUpdater.exe,” masqueraded as an update to the Live Update tool, but it was actually an older version of the program trojanized with malware. Russia, Germany, and France had by far the most ShadowHammer infections, followed by Italy and the US.

Asus Live Update Pushed Malware to 1 Million PCs

After installation, the malware scanned the computer’s unique network card MAC address, looking for a match on its embedded list of 600 systems. If the program found a match, it would reach out to a command and control server to download additional malware to take over the computer. So, the attackers knew who they were going after and cast the widest net possible in an attempt to catch them. Kaspersky researchers know the MAC addresses targeted, but we don’t know who owned those systems or how the attackers learned their hardware IDs.

Kaspersky believes those behind ShadowHammer also perpetrated the CCleaner attack 2017. That malware campaign also targeted Asus and could be how the attackers gained access to the Asus servers. Kaspersky will publish a full report on the malware soon, but there’s a summary post already available. Researchers have also put up a page where you can input your MAC address to see if it was on the target list. Kaspersky’s security tools will now detect and remove ShadowHammer as well.

Continue reading

Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal
Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal

Known simply as 2FA Authenticator, the app picked up more than 10,000 installs until security researchers identified it as a vehicle for trojan-dropper malware.

Clever Malware Masquerades as Windows 11 Installer
Clever Malware Masquerades as Windows 11 Installer

A Russian website disguised as an official Microsoft page is distributing an "upgrade installer" that won't get you Windows 11. What it will get you is a bunch of malware.

Researchers Devise Malware That Runs When an iPhone is Powered Off
Researchers Devise Malware That Runs When an iPhone is Powered Off

The iPhone's low-power mode allows users to access Express cards and locate lost devices even when the phone is turned off—but it also presents a concerning security vulnerability.

Google Warns of Sophisticated Malware Distributed With The Help of ISPs
Google Warns of Sophisticated Malware Distributed With The Help of ISPs

According to Google's Threat Analysis Group (TAG), this spyware was developed by an Italian company called RCS Labs. The firm claims to be on the right side of the law, but that doesn't change the fact its software is being used to breach user privacy.