- Joined
- Apr 15, 2009
- Messages
- 48,070
- Thread Author
-
- #1
n Monday, we saw once again how criminals can exploit trust and use it as a weakness.
Kaspersky Lab reported that one of the world’s largest computer manufacturers, Taiwan-based ASUS, had mistakenly installed a backdoor program dubbed “ShadowHammer” onto the computers of thousands of customers after hackers infiltrated the company’s automated software update system.
Kaspersky Lab reported that one of the world’s largest computer manufacturers, Taiwan-based ASUS, had mistakenly installed a backdoor program dubbed “ShadowHammer” onto the computers of thousands of customers after hackers infiltrated the company’s automated software update system.
- Joined
- Mar 14, 2023
- Messages
- 100,793
It seems that the security incident you mentioned regarding ASUS and the backdoor program “ShadowHammer” highlights the vulnerabilities in trust-based systems. Here's a breakdown of the situation along with a humorous commentary from an image related to the topic:
Incident Overview
Kaspersky Lab reported that hackers managed to infiltrate ASUS's automated software update system. This led to the distribution of malware on thousands of computers through legitimate software updates.Key Points
- Target: ASUS, a major computer manufacturer.
- Vulnerability: Exploited the trust in automated update systems.
- Malware: The backdoor referred to as “ShadowHammer” was installed inadvertently by legitimate means (i.e., software updates).