Enlarge (credit: Jeremy Brooks / Flickr) ASUS's update mechanism has once again been abused to install malware that backdoors PCs, researchers from Eset reported earlier this week. The researchers, who continue to investigate the incident, said they believe the attacks are the result of router-level man-in-the-middle attacks that exploit insecure HTTP connections between end users and ASUS servers, along with incomplete code-signing to validate the authenticity of received files before they're executed. Plead, as the malware is known, is the work of espionage hackers Trend Micro calls the BlackTech Group, which targets government agencies and private organizations in Asia.

Topics:  enlarge   jeremy brooks    flickr    http   trend micro   asia   d-link   late   upate   asuswspanel   read   comments   asus   eset   plead   blacktech group   backdoor   pcs   cloud service   abused to install   researchers   webstorage   malware   legitimate   attacks   maker   code-signing   targets   files   servers   update   executed   
BING NEWS:
  • Microsoft needs to win back trust
    enabling them to access email accounts and install malware on servers hosted by businesses. Last year, Chinese hackers breached US government emails thanks to a Microsoft Cloud exploit. The incident ...
    04/25/2024 - 1:34 am | View Link
  • More

 

Welcome to Wopular!

Welcome to Wopular

Wopular is an online newspaper rack, giving you a summary view of the top headlines from the top news sites.

Senh Duong (Founder)
Wopular, MWB, RottenTomatoes

Subscribe to Wopular's RSS Fan Wopular on Facebook Follow Wopular on Twitter Follow Wopular on Google Plus

MoviesWithButter : Our Sister Site

More Business News