请登录后使用此功能。 您可以使用此功能将商品添加到您的收藏列表。
关闭
您已经添加该商品到您的收藏列表。 查看我的收藏
关闭
从您收藏列表中删除此商品。
关闭
请登录后使用此功能。 您可以使用此功能将公司添加到您的收藏夹列表。
关闭
这家公司已成功添加。 查看我的收藏
关闭
这家公司已从你的收藏夹列表中删除。
关闭
请登录后使用此功能。 您可以使用此功能将公司添加到您的询问车。
关闭
这家公司已被添加到您的询问车。
关闭
这家公司已从询价车中删除。
关闭
该商品已被添加到您的询问车。
关闭
该商品已经从您的询价车中删除。
关闭
商品/公司已达到添加至询价车的数量。
关闭
Fictron Industrial Supplies Sdn Bhd
Fictron Industrial Supplies Sdn Bhd 200601019263

Researchers ASUS Computers Infected by Auto-Update Virus

27-Mar-2019

BOSTON (AP) — In a sophisticated precise espionage process, hackers corrupted tens of thousands of computers from the Taiwanese company ASUS with harmful software using the company's online automatic update service, security researchers reported Monday.
 
Kaspersky Lab said it noticed 57,000 infections among customers of its antivirus software. It shows that the exploit likely influenced more than 1 million computers from the world's No. 5 computer company. The malware was designed to open a ' back-door ' for intruders in the infected machines, researchers said. About 50 percent of the affected Kaspersky anti-virus software customers were in Russia, Germany and France, the company said . The U.S. accounted for less than 5 percent. A Symantec spokeswoman said about 13,000 of its antivirus customersreceived the malicious updates. The so-called supply-chain attack was first reported by the online news site Motherboard.
 
Kaspersky said the infected software was on ASUS's Live Update servers from June to November and was signed with legit certificates. It did not identify the malware until January when new capabilities were added to its anti-virus software, the company said. Kaspersky said its researchers determined that the malware was set for surgical espionage when they saw that it was designed to accept a second malware payload for certain computers based on exclusive identifiers of their network connections. It discovered more than 600 computers programmed to obtain the payload. In a blog post and answers to emailed questions, the company said the nature of the second malware payload was unknown because the server that delivered it was no longer active. Kaspersky said that while it is too early to know who was behind the operation, it is steady with a 2017 incident blamed by Microsoft on a Chinese state-backed group the company calls BARIUM.
 
ASUS did not instantly interact to two emailed requests seeking comment.



This article is originally posted on Tronserve.com
总办事处

Fictron Industrial Supplies Sdn Bhd 200601019263
No. 7 & 7A, Jalan Tiara, Tiara Square, Taman Perindustrian Sime UEP, 47600 Subang Jaya, Selangor, Malaysia.

电话:
传真:

邮件:
网址: http://www.fictron.biz
网址: https://fictron.newpages.com.my/
网址: https://fictron.n.my/
网址: http://fictron.newstore.my/

其他办事处

Fictron Industrial Automation Pte Ltd
140 Paya Lebar Road, #03-01, AZ @ Paya Lebar 409015, Singapore.

电话:
邮件:

游览 : 首页 - 分类 - 公司 - 地区 - 标签 - 商品 - 消息与促销 - 工作征聘 - 手机版 - 谷歌 - 搜索引擎优化结果

NEWPAGES

Seni Jaya Logo
Brochure
Download
Our PackageContact Us