Asus downplays reach of Live Update hack, issues a fix in latest version

Update: No longer in denial of a security report pointing to Asus's Live Update utility being compromised, the company sent PC Gamer a statement on the matter.

"A small number of devices have been implanted with malicious code through a sophisticated attack on our Live Update servers in an attempt to target a very small and specific user group. Asus customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed," the company said.

Asus did not say exactly how many PCs were hit, but its claim of it being only a "small number of devices" suggests Asus believes it's not potentially in the millions, as Kaspersky surmised.

Asus also said it has implemented a fix in the latest version of Live Update (version 3.6.8), along with multiple security verification mechanisms and enhanced end-to-end encryption.

"At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future," Asus said.

Finally, Asus released a security diagnostic tool to check if your system is affected. It's encouraging all users of Asus hardware to run it as a precaution. You can download the tool here.

Original story:

When it comes to PCs, true security is a myth. Lest anyone need reminding of this, security firm Kaspersky dropped a bombshell on Monday, saying hackers were able to install backdoors on tens of thousands of PCs—and maybe even millions of systems—by pushing out firmware updates through Asus's own Live Update software.

In security parlance, a backdoor is a way for an administrator to gain access to a system or data through a generally undocumented means. By their nature, backdoors are vulnerabilities that attackers can exploit, if they know about them.

Live Update is a utility that allows Asus to push out driver, software, and firmware updates to PCs. It comes preinstalled on many Asus-brand laptops and desktops, and is offered as a standalone download for the company's millions of motherboards. Using Live Update is a convenient way to stay updated, and until now, has been considered safe.

It might not be as safe as we assumed, however. After Vice Motherboard ran a story on Kaspersky's findings, the security firm clarified a few details in a blog post, saying that over 57,000 users of its antivirus software have downloaded and installed the compromised version of Live Update at some point in time.

"We are not able to calculate the total count of affected users based only on our data; however, we estimate that the real scale of the problem is much bigger and is possibly affecting over a million users worldwide," Kaspersky said.

Dubbed "Operation Shadowhammer," the culprits may not have actually been targeting millions of users, but a comparatively select few.

"The goal of the attack was to surgically target an unknown pool of users, which were identified by their network adapters’ MAC addresses ...  We were able to extract more than 600 unique MAC addresses from over 200 samples used in this attack. Of course, there might be other samples out there with different MAC addresses in their list," Kaspersky added.

Kaspersky discovered the "sophisticated supply chain attack" in January of this year and found links to an attack from 2017. The company says one of the reasons it was able to go undetected all of this time is because the Trojanized updates were signed with legitimate security certificates from Asus, and were hosted on Asus's official update servers.

Asus denied this when contacted by Kaspersky in January, telling the company that its servers were not compromised and that it had not hosted any malware. However, Kaspersky is not the only security outfit to trace the malware samples back to Asus.

Symantec, makers of Norton software, told Motherboard that it found another 13,000 computers with the malicious software update utility. That bumps the tally to 70,000, though the true number could be in the hundreds of thousands, or even millions, as Kaspersky surmises.

"We saw the updates come down from the Live Update Asus server. They were trojanized, or malicious updates, and they were signed by Asus," said Liam O’Murchu, director of development for the Security Technology and Response group at Symantec.

Asus may not be the only one affected by this attack. Kaspersky told our friends at TomsHardware that three other computer makers in Asia had also been "backdoored with very similar methods and techniques," but didn't name the companies. 

TOPICS
Paul Lilly

Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).

Latest in Motherboards
A photo of an ASRock Z890 Taichi Lite motherboard
ASRock Z890 Taichi Lite review
A photo of the Asus TUF Gaming B860M-Plus WiFi motherboard
Asus TUF Gaming B860M-Plus WiFi review
A photo of an Asus ROG Strix B850-F Gaming WiFi motherboard
Asus ROG Strix B850-F Gaming WiFi review
Gigabyte X870E Aorus Pro motherboard with the SSD heatsinks detached and on a light desk.
Gigabyte X870E Aorus Pro review
Gigabyte Z890 Aorus Elite WiFi 7 Ice on a light desk with a white background and SSD covers removed.
Gigabyte Z890 Aorus Elite WiFi7 Ice review
Gigabyte's X870 Aorus Elite WiFi7 Ice motherboard on a light desk with white background.
Gigabyte X870 Aorus Elite WiFi7 Ice review
Latest in News
Recently appointed Intel CEO Lip-Bu Tan.
Here comes Intel's new CEO: a semiconductor veteran that won the same prestigious award as Jensen Huang and Lisa Su
BURBANK, CALIFORNIA - AUGUST 15: Protestors attend the SAG-AFTRA Video Game Strike Picket on August 15, 2024 in Burbank, California. (Photo by Lila Seeley/Getty Images)
8 months into their strike, videogame voice actors say the industry's latest proposal is 'filled with alarming loopholes that will leave our members vulnerable to AI abuse'
Orithopter shooting down another in Dune
Dune: Awakening confirms air-to-air combat in ornithopters
live action Jimbo the Jester from Balatro holding a playing card and addressing the camera
LocalThunk forbids AI-generated art on the Balatro subreddit: 'I think it does real harm to artists of all kinds'
Inzoi - A Zoi's face in three graphical presets showing a progression from a slightly blurry minimum specs to a higher fidelity recommended specs.
Oh great, the full Inzoi system requirements are posted and I'm barely above the minimum specs so I guess my Zois will be beautifully blurry
Mark Darrah
BioWare veteran says a big delay is better than lots of little ones, because sometimes you just gotta 'burn it down and take the other fork in the road'