A single hacking group is 'poisoning' legitimate software updates with malware

Pixabay via kalhh. Click for original. (Image credit: Pixabay via kalhh)

Surfing on seedier corners of the web where malware is known to hang around is obviously risky business, but when it comes to downloading updates for a widely used utility or grabbing a new driver, we take for granted that the manufacturer is pushing out clean code. Unfortunately, that isn't always the case. There is a hacking group that is actively mucking with trusted downloads, and nobody can seem to figure out the group's exact identity.

That latter bit is troubling, though the bigger concern is that no downloads are safe. Users of Asus's Live Update utility recently found that it out when it was discovered that hackers had compromised a version of the software on the company's website, which effectively allowed the culprits to install backdoors on an estimated half a million Windows PCs.

"A small number of devices have been implanted with malicious code through a sophisticated attack on our Live Update servers in an attempt to target a very small and specific user group. Asus customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed," Asus said at the time.

Asus is not the only victim, though. According to a detailed Wired report, the hacking group that infiltrated Asus is the same one that also infected a previous version of CCleaner, a popular PC cleanup utility.

The hacking group responsible is conducting what are known as supply chain attacks because they exploit the software distribution channel. This is particularly insidious, as customers typically assume that software grabbed directly from the vendor is safe. Supply chain exploits of at least half a dozen companies over the past three years are all believed to have been carried out by the same hacking group.

Security firms have different names for the group. It's mostly known as Barium, though has also been referred to as ShadowHammer, ShadowPad, and Wicked Panda. They all point to the same group.

Supply chain attacks seem to be this group's thing. Not a lot is known about the group, other than it's believed to operate out of China. It could be a single individual (unlikely), a few individuals, a lot of hackers. Researchers just don't know.

"They're poisoning trusted mechanisms," Kaspersky told Wired. "They're the champions of this. With the number of companies they've breached, I don't think any other groups are comparable to these guys."

What's odd is that despite the potential to dole out mass damage, the group seems to be focused on smaller targets. For example, out of the 600,000 machines researchers say were affected by the breach at Asus, the malware filtered out targets based on MAC addresses to just 600 machines. And with CCleaner, only around 40 computers out of 700,000 that were infected received a follow-up piece of malware.

Other than the group's exact identity, there is a lot that researchers don't know at the moment, including how the hackers are able to infiltrate so many companies, what the group's ultimate goal is, and who exactly they might be targeting (and why).

What's also concerning is the potential to do a lot more damage. Silas Cutler, a researcher at Chronicle, has been tracking Barium. He told Wired that the group could unleash a "far more devastating" attack than NotPetya, a Russian cyberattack that caused record $10 billion in damages. All Barium would have to do is deploy a ransomware worm through one of these attacks, Silas says.

The nature of a supply chain attack makes it difficult to avoid being infected, outside of never updating your software. That is dangerous in and of itself, though. Your best bet is to stay diligent with frequent antivirus scans, and never assume that anything you download is safe, no matter where it came from.

Paul Lilly

Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).

Latest in Security
An FBI wanted poster for alleged hacker Zhou Shuai.
US Justice Dept announces $10 million bounty on at-large 'hacker-for-hire' cabal it says targeted China critics, religious missionaries, and the Treasury
Kinzie, in an FBI jacket, uses a computer with the logo of the Third Street Saints on it
Have I Been Pwned adds over 284 million compromised passwords from latest breach
A still from a YouTube video of Senator Mark Warner speaking
Telecoms hack on US government officials is 'worst in nations history' and 'the barn door is still wide open' says senator
HDMI cable
Hackers can wirelessly spy on your display by collecting HDMI signal leaks and churning them through an AI, but I wouldn't break out the tin foil just yet
Computer code and text displayed on computer screens. Photographer: Chris Ratcliffe/Bloomberg
Forcing users to periodically change their passwords should go the way of the dodo according to the US government
An original Apple Macintosh Model M0001, as they celebrate 40th anniversary, is on display in between 2024 Apple models at the independent Apple products store chain Amac, on January 24, 2024 in Utrecht, The Netherlands. Based on the Motorola 68000 microprocessor, the Macintosh was the first successful mouse-driven computer with a graphical user interface.
Major browser providers scramble to patch an 18-year-old vulnerability affecting MacOS and Linux systems but Windows remains gloriously immune
Latest in News
The snazzy red and black HyperX Cloud Alpha wireless headphones float in a teal void. The microphone is attached to the headset.
The best wireless gaming headset is now even better in the Amazon Big Spring Sale, boasting a more than $50 discount
A chip being held up in an Intel fab
Intel is reportedly 'working to finalize commitments from Nvidia' as a foundry partner, suggesting gaming potential for the 18A node
Amazon box
Don't panic! The 'Do Not Send Voice Recordings' option Amazon just removed was only used by 0.03% of customers and they can still have it
Digital generated image of people surrounded by interactive transparent and glowing panels with data. Visualising smart technology, blockchain and artificial intelligence
Now I shall demand the cookies! Proposed new browsing agreement turns the tables and lets users dictate terms to websites
Intel CEO, Pat Gelsinger, with a 18A SRAM test wafer
Former Intel CEO, Pat Gelsinger becomes executive chairman of a 'Technology Platform Connecting the Faith Ecosystem' to work on Christian AI using DeepSeek
Assassin's Creed Shadows immersive mode - Naoe holding a tanto in her hand as two guards fall to the ground behind her.
Assassin's Creed Shadows' first hotfix addresses stability issues and a photo mode crash