Asus Live Update Driver
While Kaspersky has only been able to count the total numbers of users infected by the trojanized ASUS Live Update who were also running. The attack targeted users of the ASUS Live Update Utility. The China-backed BARIUM APT is suspected to have deployed the backdoor code. Yesterday, we reported on a rather alarming security exploit which took advantage of a weakness in the ASUS Live Update utility installed on.
|File Size:||26.3 MB|
|Supported systems:||Windows All|
|Price:||Free* (*Free Registration Required)|
Asus Live Update Driver
Attackers abuse this condition to move laterally through networks, bypassing address-based controls to spread malware. Of course, we have notified ASUS and other companies about the attack.
|Adaptec Wireless PCI Card||Share your voice|
|Epox EP-8HDA5J||The Malware Was Hidden in ASUS’s Live Update System|
|Samsung S23C350H LED Monitor||Attack on ASUS utility|
|AirTies Air2410 Wireless Adapter||ASUS Live Update tool hack: ASUS responds|
|Lenovo ThinkPad T440p Realtek Bluetooth||Login with Forum Account|
Asus Live Update a very small number of specific user group were found to have been targeted by this attack and as such it is extremely unlikely that your device has been targeted. Further research revealed that the ShadowHammer malware has targeted and successfully attacked multiple companies, not just ASUS.
In these other attacks, similar algorithms were used and Asus Live Update like in the ASUS case, legitimately signed certificates were used. The investigation is still in progress, Kaspersky said. Why Asus didn't warn customers about the malicious update sooner isn't clear.
This makes it an extremely attractive target for APT groups that might want to take advantage of Asus Live Update userbase. This version addresses vulnerabilities that a remote attacker could exploit to take control of an affected system.
These vulnerabilities were detected in exploits in the wild. In the case Asus Live Update the Asus incident, attackers were targeting more than machines in particular. It is not yet very clear what the ultimate goal of the attackers was and we are still researching who was behind the attack. Finally, Asus released a security diagnostic tool to check if your system is affected.
Inthe Asus Live Update software tool CCleaner was hijacked to install malware on millions of computers. ASUS pre-installs this tool on its machines. Using stolen digital certificates used by ASUS to sign legitimate binary files, attackers manipulated older versions of ASUS software and injected their own malicious code into a backdoor.