ASUS announced yesterday that it was the victim of a highly sophisticated APT attack, trying to justify its hack of the ASUS Live app Update. But as everything shows, the company doesn't seem to care that much about consumer safety.
The company's announcement yesterday said:
Advanced Persistent attacks Threat (APT) are attacks that take place at a national level and are usually initiated by a few countries that target certain international organizations or agencies rather than consumers.
Το ASUS Live Update είναι ένα ιδιόκτητο εργαλείο που διαθέτουν οι φορητοί υπολογιστές ASUS για να διασφαλιστεί ότι το σύστημα θα έχει πάντα από τα πιο πρόσφατα programs drivers and firmware from ASUS.
So a small number of devices have been found with malicious code through a sophisticated attack on the Live Update servers in an attempt to target a very small and specific teamof users. ASUS customer service is contacting affected users and providing assistance in removing the security risks.
Essentially what the company wants to tell us is that sophisticated APT attacks are not targeted at all consumers but in some targeted by government groups. However, ASUS Live Update is targeted and used by all consumers, and even if it publishes the company at this time, it does not change the fact that its systems have endangered millions of customers.
But let's see what the company has to say:
According to TechCrunch, the company has been warned about the loose safety of security researcher Zack Whittaker:
The security researcher warned Asus two months ago that its employees were publishing codes access on GitHub that could be used to access the company's corporate network.
A password, found in a workers' repo, allowed the researcher to access an email account that internal developers and engineers use to share apps, drivers, and tools.
This particular security breach was not directly responsible for the latest violation of ASUS Live Update, but it shows an incredible indifference to very simple security procedures.