{"id":16473,"date":"2019-03-28T11:20:22","date_gmt":"2019-03-28T15:20:22","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=16473"},"modified":"2019-03-28T11:20:22","modified_gmt":"2019-03-28T15:20:22","slug":"asus-live-update-compromised-by-attackers","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/asus-live-update-compromised-by-attackers\/","title":{"rendered":"ASUS Live Update compromised by attackers"},"content":{"rendered":"<h1><span style=\"font-family: helvetica, arial, sans-serif; font-size: 30pt;\">ASUS Live Update compromised by attackers<\/span><\/h1>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">If you have an ASUS computer, this is for you.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">ASUS Live Update was compromised by attackers and loaded with a malicious update &#8211; a backdoor Trojan known as Operation ShadowHammer. As of right now, it&#8217;s estimated that around a half-million Windows (ASUS) computers have had the malicious backdoor installed on their computers via compromised ASUS updates. This fake ASUS update server was operated by attackers. ASUS denied that its server was compromised, however, the malware samples trail leads right back to the Asus server, according to <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/pan9wn\/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers\" target=\"_blank\" rel=\"noopener noreferrer\">vice.com<\/a>.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Apparently, ASUS is no longer denying the attack as they are distributing a small program to help ASUS users check to see if their computers have been compromised.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">If you have an ASUS computer running any version of Windows, you can download a small program from ASUS to check your computer to see if it has been compromised.\u00a0 Y<a href=\"https:\/\/dlcdnets.asus.com\/pub\/ASUS\/nb\/Apps_for_Win10\/ASUSDiagnosticTool\/ASDT_v1.0.1.0.zip\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"text-decoration: underline;\">ou can download the tool from here<\/span><\/a>. Once you download it, unzip it and double-click on the exe file to run it.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2019\/asus-check.png\" alt=\"Cloudeight InfoAve\" width=\"552\" height=\"204\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2019\/asus-check1.png\" alt=\"Cloudeight InfoAve\" width=\"580\" height=\"215\" \/><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Since this backdoor was sent to ASUS computer users via a trusted channel (ASUS Live Update), it may have been able to bypass most security software.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ASUS Live Update compromised by attackers If you have an ASUS computer, this is for you. ASUS Live Update was compromised by attackers and loaded with a malicious update &#8211; a backdoor Trojan known as Operation ShadowHammer. As of right now, it&#8217;s estimated that around a half-million Windows (ASUS) computers have had the malicious backdoor installed on their\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/asus-live-update-compromised-by-attackers\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1669,1,1426,1682,1680,1656],"tags":[3022,3021,3023,3024],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16473"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=16473"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16473\/revisions"}],"predecessor-version":[{"id":16474,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/16473\/revisions\/16474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=16473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=16473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=16473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}