6/16/2023 0 Comments Asus live update malware![]() Kaspersky researchers know the MAC addresses targeted, but we don’t know who owned those systems or how the attackers learned their hardware IDs. So, the attackers knew who they were going after and cast the widest net possible in an attempt to catch them. If the program found a match, it would reach out to a command and control server to download additional malware to take over the computer. Russia, Germany, and France had by far the most ShadowHammer infections, followed by Italy and the US.Īfter installation, the malware scanned the computer’s unique network card MAC address, looking for a match on its embedded list of 600 systems. The researchers discovered the attack in January, after. The program, called “ASUSFourceUpdater.exe,” masqueraded as an update to the Live Update tool, but it was actually an older version of the program trojanized with malware. Thousands of Asus computers were infected with malware from the companys own update tool, researchers from Kaspersky Lab said Monday. Like everything else distributed via the Asus Live Update tool, the programs were signed by Asus and automatically trusted by the system. ![]() According to Kaspersky, the malware arrived on machines for about five months last year, from June to November.
0 Comments
Leave a Reply. |