Skip to main content

ASUS provides update on backdoor flaw

(Image credit: Image Credit: JMiks / Shutterstock)

Following news earlier this week that ASUS devices have been targeted by a highly specialised cybercriminal group, the company has revealed its next steps.

The company issued a press release confirming that ASUS Live Update, the company’s software that comes preloaded with ASUS devices and is used to update BIOS and similar elements, was compromised and used to install backdoors on thousands of computers.

“A small number of devices have been implanted with malicious code through a sophisticated attack on our Live Update servers in an attempt to target a very small and specific user group,” the ASUS press release states. “ASUS customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed.”

The earlier report claims hackers, whoever they are, knew exactly who they were targeting because they had their victims’ MAC addresses. They cross-referenced those addresses with what they could find through the ASUS Live Update, and when the target was confirmed, proceeded to install additional malware.

Given that a specific group of users were targeted, other machines that had this malware installed weren’t threatened. The malware successfully eluded cybersecurity experts for months.

It was finally uncovered in January 2019 by Kaspersky Lab, which said that some 600 machines were targeted by the backdoor.

Image Credit: JMiks / Shutterstock