2/12/2023 0 Comments Asus live update 3.6 8![]() ![]() To be able to block further attacks targeting its servers, ASUS says that it "updated and strengthened our server-to-end-user software architecture." ![]() Says only small number of machines infected (researchers say 500k+) also says it’s finally begun to notify customers ( told them about prob in Jan.) They don’t bother to thank Kaspersky at all in statement. The company also said that "only the version of Live Update used for notebooks has been affected," with all other devices not being affected by the supply chain attack.Īdditionally, ASUS states that its "customer service has been reaching out to affected users and providing assistance to ensure that the security risks are removed."Īs detailed in the press release, the company fixed the issue in the ASUS Live Update tool's 3.6.8 release by adding a number of security check mechanisms designed to block "malicious manipulation" via updates or any other methods. "A small number of devices have been implanted with malicious code through a sophisticated attack on our Live Update servers in an attempt to target a very small and specific user group," says ASUS. Asus confirmed today that its Live Update utility has been indeed infected with malicious code by an advanced persistent threat (APT) group as part of a supply chain attack which managed to compromise some of its servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |