18 votes

A trojanized version of the ASUS Live Update Utility was signed and hosted on the official server and distributed to an estimated 1 million users

3 comments

  1. ggnore
    Link
    600 specific MAC addresses, there's very interesting.

    “They were not trying to target as many users as possible,” said Kamluk. “They wanted to get into very specific targets and they already knew in advance their network card MAC address, which is quite interesting.”

    600 specific MAC addresses, there's very interesting.

    4 votes
  2. hereticalgorithm
    (edited )
    Link
    An update from Kapsersky Labs. Most notably: Looking up BARIUM & Winnti gets me this report from ProtectWise's research group, which claims BARIUM is under the umbrella of Chinese state...

    An update from Kapsersky Labs. Most notably:

    Although precise attribution is not available at the moment, certain evidence we have collected allows us to link this attack to the ShadowPad incident from 2017. The actor behind the ShadowPad incident has been publicly identified by Microsoft in court documents as BARIUM. BARIUM is an APT actor known to be using the Winnti backdoor. Recently, our colleagues from ESET wrote about another supply chain attack in which BARIUM was also involved, that we believe is connected to this case as well.

    Looking up BARIUM & Winnti gets me this report from ProtectWise's research group, which claims BARIUM is under the umbrella of Chinese state intelligence actors. Also, as for the 600 MACs targeted:

    Initial attack targets are commonly software organizations in the United States, Japan, South Korea, and China. Later stage high profile targets tend to be political organizations or high-value technology companies.

    4 votes