loader gif

ShadowHammer Supply-Chain Attack Didn't Just Target Asus; At Least Six Other Organizations Targeted

ShadowHammer Supply-Chain Attack Didn't Just Target Asus; At Least Six Other Organizations Targeted (Malware and Vulnerabilities)

In the case of Asus, the attack involved the compromising of the company's Live Updater tool and subsequently stuffing it with a Trojan malware strain. Electronics Extreme, Zepetto, and Innovative Extremist, the other company Kaspersky mentioned by name, are all game developers, and Kaspersky reckons they got infected through the use of malware ridden development tools. "Our deep search revealed another malware injection mechanism, which comes from a trojanized development environment used by software coders in the organisation." Kaspersky has yet to figure out if the infection stemmed from a video game company installing the trojanized development software or if the code was deployed after the developer's machine was compromised. "While we could not identify how the attackers managed to replace key files in the integrated development environment, this should serve as a wakeup call to all software developers," warned the researchers, who suggested the developers question where their development software comes from, if the delivery process of IDE distributions is secure, and when the last time the integrity of their development software was checked.

loader gif