About Us | Contact Us
View Cart

Asus Malware Highlights The Risk of Supply Chain Attacks

By Vigilize | Monday, April 8, 2019 - Leave a Comment

The malware was distributed through Asus’ own tool, and was signed with a valid certificate…

An article review.

When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recent attack targeting Asus customers is a reminder that sometimes even that may not be enough to protect you. The attack, described in an article submitted by our own Chris Dietrich, utilized Asus’ own LiveUpdate tool to distribute an infected software update…and the update was even signed with a valid Asus digital signature.

The good news is that the attack on Asus customers wasn’t as broad—or as devastating—as it could have been, with experts believing that only about 600 people were targeted specifically by the perpetrators. While the targeted nature of the attack may have some breathing easier, there’s nothing stopping future attacks from being more widespread, and when it comes to mitigation there may not be an easy solution.
Some level of trust is necessary for software patches and updates to be distributed in the first place, and if a manufacturer’s supply chain has been compromised (including their digital signatures) there may be no way for an end user to determine that an update is malicious. One strategy could be to hold any new updates for a period of time, but even that can be problematic when various software packages now update themselves without user input—and some don’t even allow for these updates to be stopped.

As frightening as the threat may be, the risk of a supply chain attack happening–thankfully–remains relatively low. It may be difficult to prevent a properly signed update containing malware from being sent, but the risk can be mitigated somewhat by policies that call for the review of patches and other updates before installation…and which prevent end users from updating software on their own!

Original article by Lily Hay Newman writing for Wired.



Latest News
    A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]
    The One Test… …Is there a Test that Covers 9/11’s of the Battle? Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Twenty years ago two geek-friends and I debated the following question:  “Is there an Audit Test that covers 9/11’s of the battle?” This […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex has just hired Tanvee Dhir, to be a new Data Security Analyst. “Tanvee is an outstanding addition to the team, bringing a new skillset we are eager to utilize.” says Chad Smith, NOC Manager of infotex. “I am really excited to be […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
    Seven Trends . . . that small bank Information Security Officers face in 2021 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]