#Asus live update no updates updateUpdate March 25th, 12:30PM ET: Asus says it will issue a statement tomorrow afternoon. Work is being done to develop more secure update systems, but for now, companies largely rely on their own solutions. ![]() Now, a smart screen might appear and ask for a confirmation. Double-click on the downloaded ASUS Live Update installer file. Understandably, some Asus users have decided to completely uninstall the Live. Save the downloaded file to your computer. According to Kaspersky Lab, the malicious updates came as new versions to Live Update 3.5.9, 3.6.0, 3.6.2, and 3.6.5. It hasn’t been done frequently, but the fact that it can be done at all is a huge risk. So here we go: Download the ASUS Live Update installer file from the link above. Hacking a company’s update system allows malicious actors to breach computers on a wide scale. While the malware could have been distributed to 1 million computers, Kaspersky tells Motherboard that the total PCs that installed it is estimated to be in the “hundreds of thousands.” Kaspersky says 57,000 people using its security software had the malware installed, and Symantec told Motherboard that it identified 13,000 customers with the malware. Asus apparently denied that the malware had come from its servers after being contacted by Kaspersky, then it stopped responding, according to Motherboard. In an email to The Verge, Asus said it would issue an official statement on the malware tomorrow afternoon. It doesn’t appear that Asus has contacted customers or taken action to stop the malware. Kaspersky named the attack “ShadowHammer.” This kind of targeting is often associated with espionage attacks by nation states, most notably Stuxnet, which spread widely but did little to no harm on most infected systems.Īsus has yet to comment on Kaspersky’s findings #Asus live update no updates installOnce one of those systems was detected, the update would then install more malicious programs to further compromise the system. However, the hackers did seem to target specific Asus customers: the malware included special instructions for 600 systems, to be identified by specific MAC addresses. It’s not clear what the hackers were after. Details of the hack were first revealed by Motherboard, and Kaspersky plans to release more details at an upcoming conference. The malware was disguised as a “critical” software update, distributed from Asus’ servers, and signed using a real Asus certificate that made it appear to be valid. Free asus live update driver download software at UpdateStar - Using ASUS Live Update Utility you can perform BIOS updates from Windows. Asus’ software update system was hacked and used to distribute malware to about 1 million Windows computers, according to the cybersecurity firm Kaspersky Lab.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |