Compromised ASUS Factory Updates Infected A Million Hosts. Targeted 600 Specific Machines.

Compromised ASUS Factory Updates Infected A Million Hosts. Targeted 600 Specific Machines.

Spyware sneaks into 'million-ish' Asus PCs via poisoned software updates, says Kaspersky


Hackers were interested in 600 or so targets, it is claimed.






A million or so Asus personal computers may have downloaded spyware from the computer maker's update servers and installed it, Kaspersky Lab claims.

Someone was able to modify a copy of the Asus Live Update Utility, hosted on the Taiwanese manufacturer's backend systems, and sign it using the company's security certificate, even keeping the file length the same as the legit version, to make everything seem above board. The update utility ships with every machine, and routinely upgrades the motherboard firmware and related software with any available updates from Asus.

When it checked in with Asus's servers for the latest updates, the utility would fetch and install a backdoored version of the Asus Live Update Utility, we're told. The dodgy version was offered between June and November 2018, according to Kaspersky.

That infected build of the utility was designed to spy on roughly 600 machines, identified by their network MAC addresses hardcoded into the software. So, roughly a million Asus-built computers may have been running a trojanized update utility, with a few hundred actively spied on via the backdoor.

The software nasty, discovered by Kaspersky in January this year and dubbed compromised factory updates infected million hosts targeted specific machines