Just In
- 5 hrs ago HONOR Pad 9 With Bluetooth Keyboard Up For Grabs At Rs 22,499 in India
- 5 hrs ago Report: Apple’s Foldable iPhone May Get Cancelled
- 6 hrs ago Deal Alert: Grab the Samsung Galaxy S23 Ultra for Under ₹90,000 on Flipkart – Here’s How
- 8 hrs ago OPPO F25 Pro New Coral Purple Colour Variant Launched in India; Where to Buy?
Don't Miss
- Movies Crew Review: Tabu, Kareena & Kriti Starrer Is An Entertaining Cinematic Ride That Takes Off And Lands Smoothly
- Finance Indian Railway Finance Corp: Top Miniratna Railway Stock Hot Bet In Short Term; Axis Direct Sets Rs 155 TP
- Lifestyle Good Friday 2024: Wishes, Messages, Greetings, Texts, Images, Quotes, WhatsApp, And FB Status
- Sports RR vs DC: 'A Star is born' - Twitter Erupts in Praise as Riyan Parag's Explosive 84
- News Jailed Gangster-Turned-Politician Mukhtar Ansari Dies Of Heart Attack
- Automobiles Xiaomi SU7 Electric Car Launched – May End Apple Inc.
- Education RSMSSB Junior Instructor Recruitment 2024; Apply online for 2500 Posts, Check out for more details
- Travel Explore Tamil Nadu's Diverse Wedding Venues
Kaspersky Labs expose malicious updates for ASUS laptops
A threat actor modified the ASUS Live Update Utility.
Experts at Kaspersky Labs have uncovered what seems to be one of the biggest supply-chain incidents ever. A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops added a back door to the utility and then distributed it to users through official channels.
The trojanized utility was signed with a legitimate certificate and was hosted on the official ASUS server dedicated to updates, and that allowed it to stay undetected for a long time. The criminals even made sure the file size of the malicious utility stayed the same as that of the original one.
According to Kaspersky statistics, more than 57,000 users have installed the backdoored utility, but we estimate it was distributed to about 1 million people total. The cybercriminals behind it were not interested in all of them, however - they targeted only 600 specific MAC addresses, for which the hashes were hardcoded into different versions of the utility.
While investigating this attack, Kaspersky found out that the same techniques were used against software from three other vendors. The security firm notified ASUS and other companies about the attack. As of now, all Kaspersky Lab solutions detect and block the trojanized utilities, but users are suggested to update the ASUS Live Update Utility.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
49,999
-
30,700
-
23,990
-
1,25,999
-
36,999
-
38,999
-
1,17,840
-
35,000
-
23,960
-
82,510
-
11,999
-
25,999