← Supply-Chain Attack Compendium

ASUS Live Update

Incident Summary

ASUS Live Update delivered targeted backdoors.

Attackers compromised ASUS Live Update servers and signed trojanized utility builds with stolen digital certificates. The first stage reached a broad population, but its second-stage logic was selective, checking MAC addresses against a target list before installing deeper backdoors on chosen machines.

Date
2018-06-01 to 2018-11-01
Category
Commercial
Target Surface
Distribution
Insertion Phase
distribution
Impact
Backdoor
Cause
Update server compromise

What Was Affected

Package ASUS Live Update
ComponentApplication
Artifact typebinary archive
Domain typeproject download host
Domain asus.com

Compromised Versions

  • Multiple versions of ASUS Live Update utility distributed between June and November 2018

Incident Context

Motive
Espionage (highly targeted)
Attribution
Nation-state
Transitive
No
User Impact
57000
Observed Duration
153 days

Evidence

Compromised Artifacts

Current Artifacts and Analysis

Indicators and Changes

Hashes

  • sha256:0f49621b06f2cdaac8850c6e9581a594128d69204c18589921e1fb5b7074da30
  • sha256:5855a5562d9add04ce523bfec4166c4cd252ffc398b18b2856a2faec8b1142e7
  • sha256:72a4bed7e48266794e07c8acc3ac4c8e6a6d0fbe6aa6eb8be3880d32e1874627

External References

Source Data

Source record: proprietary/asus/meta.yaml