It identified more than 600 computers programmed to receive the payload. Kaspersky said its researchers determined that the malware was programmed for surgical espionage when they saw that it was designed to accept a second malware payload for specific computers based on unique identifiers of their network connections. It did not detect the malware until January, when new capabilities were added to its anti-virus software, the company said. Kaspersky said the infected software was on ASUS’s Live Update servers from June to November and was signed with legitimate certificates. The so-called supply-chain attack was first reported by the online news site Motherboard. accounted for less than 5 percent.Ī Symantec spokeswoman said about 13,000 of its antivirus customers received the malicious updates. The malware was designed to open a “backdoor” for intruders in the infected machines, researchers said.Ībout 50 percent of the affected Kaspersky anti-virus software customers were in Russia, Germany and France, the company said.
0 Comments
Leave a Reply. |