{"id":14917,"date":"2019-03-25T08:30:24","date_gmt":"2019-03-25T16:30:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/25\/news-8666\/"},"modified":"2019-03-25T08:30:24","modified_gmt":"2019-03-25T16:30:24","slug":"news-8666","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/25\/news-8666\/","title":{"rendered":"ASUS Live Update Utility cracked, installs ShadowHammer backdoor on 1M PCs, but only 600 targeted"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/kaspersky-logo-flag-resized-100730050-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 25 Mar 2019 09:28:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Great way to wake up on Monday morning, especially if you own an ASUS machine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky just <\/span><a href=\"https:\/\/www.kaspersky.com\/blog\/shadow-hammer-teaser\/26149\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">published a teaser<\/span><\/a><span style=\"font-weight: 400;\"> for a more thorough explanation to come in two weeks at the Kaspersky Security Analysts Summit in Singapore. It\u2019s quite an eye-opener.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apparently somebody broke into the ASUS update servers, and swapped out a valid software\/firmware update with one of their own. The bogus update looked like the genuine thing, with a valid certificate, and its size matched the original\u2019s size. As a result, the bad update stayed on ASUS\u2019s servers \u201cfor a long time.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How bad is it? Kaspersky isn\u2019t handing out many details, but the teaser (which reads like a PR release) is quite compelling. Kaspersky calls it <\/span><a href=\"https:\/\/securelist.com\/operation-shadowhammer\/89992\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Operation ShadowHammer<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The goal of the attack was to surgically target an unknown pool of users, which were identified by their network adapters\u2019 MAC addresses. To achieve this, the attackers had hardcoded a list of MAC addresses in the trojanized samples and this list was used to identify the actual intended targets of this massive operation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky notified ASUS of the malware on Jan. 31.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to our statistics, more than 57,000 users of Kaspersky Lab\u2019s products have installed the backdoored utility, but we estimate it was distributed to about 1 million people total. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sounds bad enough, but there\u2019s yet another teaser on the tail end of the original teaser:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While investigating this attack, we found out that the same techniques were used against software from three other vendors. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not a breath of which \u201cthree other vendors\u201d are involved.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bottom line: Unless you have an ASUS machine with one of the 600 hard-coded network adapter MAC addresses, there\u2019s nothing to worry about. As for the three other vendors, who knows?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can file this away in the same bucket with Spectre, Meltdown and other Glitter Glam malware. It\u2019s great theater, and sure to draw lots of attention, but in the end unless you\u2019re defending state secrets, nuclear launch codes or weighty bitcoin wallets, it doesn\u2019t mean much.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">PR release &#8211; check<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">Catchy name &#8211; check<br \/><\/span><span style=\"font-weight: 400;\">Commercial tie-in &#8211; check<br \/><\/span><span style=\"font-weight: 400;\">Custom logo &#8211; not yet<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">We\u2019re following the spectacle on <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/asus-live-update-utility-cracked-sophisticated-backdoor-installed-on-a-million-machines-but-you-dont-need-to-worry-about-it\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3383249\/asus-live-update-utility-cracked-installs-shadowhammer-backdoor-on-1m-pcs-but-only-600-targeted.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/kaspersky-logo-flag-resized-100730050-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 25 Mar 2019 09:28:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Great way to wake up on Monday morning, especially if you own an ASUS machine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky just <\/span><a href=\"https:\/\/www.kaspersky.com\/blog\/shadow-hammer-teaser\/26149\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">published a teaser<\/span><\/a><span style=\"font-weight: 400;\"> for a more thorough explanation to come in two weeks at the Kaspersky Security Analysts Summit in Singapore. It\u2019s quite an eye-opener.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apparently somebody broke into the ASUS update servers, and swapped out a valid software\/firmware update with one of their own. The bogus update looked like the genuine thing, with a valid certificate, and its size matched the original\u2019s size. As a result, the bad update stayed on ASUS\u2019s servers \u201cfor a long time.\u201d<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3383249\/asus-live-update-utility-cracked-installs-shadowhammer-backdoor-on-1m-pcs-but-only-600-targeted.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-14917","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14917"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14917\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14917"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}