![]() ![]() It identified more than 600 computers programmed to receive the payload. Kaspersky said its researchers determined that the malware was programmed for surgical espionage when they saw that it was designed to accept a second malware payload for specific computers based on unique identifiers of their network connections. It did not detect the malware until January, when new capabilities were added to its anti-virus software, the company said. The infected software was on ASUS's Live Update servers from June to November and was signed with legitimate certificates, according to Kaspersky. ![]() ![]() It estimated the exploit likely affected more than 1 million computers. Kaspersky said it detected 57,000 infections among customers of its antivirus software. Security researchers at Kaspersky Lab disclosed Monday that hackers infected tens of thousands of ASUS computers last year in the scheme. (AP Photo/Jenny Kane)īOSTON - The Taiwanese computer company ASUS is acknowledging that suspected nation-state hackers planted malware on its online automatic update service in a sophisticated and targeted espionage operation. 5 computer company, though it was designed to surgically install a backdoor in a much smaller number of PCs. Kaspersky Labs said Monday, March 25, that the exploit likely affected more than 1 million computers from the world’s No. Security researchers say hackers infected tens of thousands of computers from the Taiwanese vendor ASUS with malicious software for months last year through the company’s online automatic update service. This Feb 23, 2019, photo shows the inside of a computer with the ASUS logo in Jersey City, N.J. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |