UPDATED 21:40 EDT / MARCH 25 2019

SECURITY

Nearly a million ASUS computer users infected by malware in automatic update

As many as 1 million users of computers made by AsusTek Computer Inc. may have been infected with malware after hackers infiltrated the company and planted it in an automatic security update.

First detected and revealed today by security researchers at Kaspersky Lab, the hack — described as one of the biggest supply-chain incidents ever — involved unknown hackers modifying the ASUS Live Update Utility to insert Trojan malware that allowed them to gain access to any infected ASUS computer.

“The trojanized utility was signed with a legitimate certificate and was hosted on the official ASUS server dedicated to updates, and that allowed it to stay undetected for a long time,” the researchers noted. “The criminals even made sure the file size of the malicious utility stayed the same as that of the original one.”

The malware affected ASUS users between June and November 2018 who had enabled the ASUS Live Update utility on their systems. The update software is installed on ASUS computers as standard but is not always turned on.

According to data from Statistica, ASUS ships about 4 million computers per quarter, meaning that an infection number of about 1 million users is relatively low.

Mike Jordan, senior director at The Shared Assessments Program told SiliconANGLE that supply-chain cybersecurity threats from software update mechanisms can be particularly devastating.

“This is a very similar method that the NotPetya malware used to cause over a billion dollars in costs and counting by hacking a third party’s software,” Jordan said. “It’s becoming increasingly important that companies add reviews of their third-party software vendors’ software update mechanisms as part of their due diligence procedures.”

Jordan added that the program’s members are discussing how to best address these threats in our working groups, especially operational technology risks to the plant floors of manufacturing, utility and energy companies. “We’ve found that the best way to address these kinds of third-party risks is by working together with all parties, including the purchasers, the vendors and the service providers that service and secure them,” he said.

Photo: Kaspersky

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.