A million or so Asus personal computers may have downloaded spyware from the computer maker's update servers and installed it, Kaspersky Lab claims.
Someone was able to modify a copy of the Asus Live Update Utility, hosted on the Taiwanese manufacturer's backend systems, and sign it using the company's security certificate, even keeping the file length the same as the legit version, to make everything seem above board. The update utility ships with every machine, and routinely upgrades the motherboard firmware and related software with any available updates from Asus.
When it checked in with Asus's servers for the latest updates, the utility would fetch and install a backdoored version of the Asus Live Update Utility, we're told. The dodgy version was offered between June and November 2018, according to Kaspersky.
That infected build of the utility was designed to spy on roughly 600 machines, identified by their network MAC addresses. So, roughly a million Asus-built computers may have been running a trojanized update utility, with a few hundred actively spied on via the backdoor.
Kaspersky Labs has named it ShadowHammer.
How promptly do you install software updates?
(Score: 1, Informative) by Anonymous Coward on Tuesday March 26 2019, @04:38PM
This has nothing to do with "cloud". PCs have been shipping with manufacturers' software, as well as 3rd party software, that is set to auto-update by default for a looooong time. Long before "cloud" was a thing.