![]() ![]() It identified more than 600 computers programmed to receive the payload. Kaspersky said its researchers determined that the malware was programmed for surgical espionage when they saw that it was designed to accept a second malware payload for specific computers based on unique identifiers of their network connections. ![]() It did not detect the malware until January, when new capabilities were added to its anti-virus software, the company said. The infected software was on Asus's Live Update servers from June to November and was signed with legitimate certificates, according to Kaspersky. accounted for less than 5 percent.Ī Symantec spokeswoman said about 13,000 of its antivirus customers received the malicious updates. Cybersecurity experts say such attacks are likely far more common than is known.Ībout 50 percent of the affected Kaspersky anti-virus software customers were in Russia, Germany and France, the company said. ![]() Nor did it acknowledge that Kaspersky notified it of the so-called supply-chain attack, which was first reported by the online news site Motherboard. 5 computer company said it fixed the compromised updating software, which automatically sends drivers and firmware to Asus laptops when authorized by users.Īsus did not respond to emailed questions. Asus said in a prepared statement that the malware infected a small number of devices in an attempt to target a very small, specific user group. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |