Difference between revisions of "Asus"

From Wikispooks
Jump to navigation Jump to search
(Created page with "{{group |wikipedia=https://en.wikipedia.org/wiki/Asus |constitutes=computer manufacturer |leaders= |logo= |twitter= |start=2 April 1989 |headquarters=Taiwan }} '''Asus''' was,...")
 
m (Text replacement - " backdoor" to " backdoor")
Line 11: Line 11:
  
 
==Spyware==
 
==Spyware==
In March 2019, [[Kaspersky]] reported that around 1,000,000 Asus computers had been infected with malware as a result of a [[hack]] which arose from a bogus upgrade utility installed on the company's servers in [[Taiwan]], which fetched and installed a backdoored version of the Asus Live Update Utility. This was signed by company's digital key. Reportedly analysis of the targetted MAC addresses revealed that around 600 specific machines were being targetted.<ref>https://www.theregister.co.uk/2019/03/25/asus_software_update_utility_backdoor/</ref>
+
In March 2019, [[Kaspersky]] reported that around 1,000,000 Asus computers had been infected with malware as a result of a [[hack]] which arose from a bogus upgrade utility installed on the company's servers in [[Taiwan]], which fetched and installed a [[backdoor]]ed version of the Asus Live Update Utility. This was signed by company's digital key. Reportedly analysis of the targetted MAC addresses revealed that around 600 specific machines were being targetted.<ref>https://www.theregister.co.uk/2019/03/25/asus_software_update_utility_backdoor/</ref>
 
{{SMWDocs}}
 
{{SMWDocs}}
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}
 
{{Stub}}
 
{{Stub}}

Revision as of 15:52, 27 August 2019

Group.png Asus  
(Computer manufacturer)Rdf-entity.pngRdf-icon.png
Formation2 April 1989
HeadquartersTaiwan

Asus was, in 2017, the world's 5th-largest PC vendor by unit sales.

Spyware

In March 2019, Kaspersky reported that around 1,000,000 Asus computers had been infected with malware as a result of a hack which arose from a bogus upgrade utility installed on the company's servers in Taiwan, which fetched and installed a backdoored version of the Asus Live Update Utility. This was signed by company's digital key. Reportedly analysis of the targetted MAC addresses revealed that around 600 specific machines were being targetted.[1]

Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.