Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Researchers publish the list of 583 MAC addresses impacted by recent ASUS hack

Researchers publish the list of 583 MAC addresses impacted by recent ASUS hack

  • The security firm Skylight released the list of 583 MAC addresses out of the total 619 targeted by the attackers.
  • The researchers disassembled Kaspersky’s diagnostic tool to get the full list of addresses.

In a recent attack campaign, attackers distributed a backdoored version of ASUS Live Update utility to target ASUS laptop users.

It was Kaspersky Lab’s Global Research and Analysis Team (GReAT) who first detected the attack campaign in January 2019, with over 57,000 Kaspersky users affected by it. The Russian security firm dubbed this supply chain attack campaign as Operation ShadowHammer.

According to some estimates, the campaign has impacted over 1 million users who downloaded the backdoored version of ASUS Live Update software. The identity and the motives of the attackers are still unknown.

Target users detected via MAC addresses

Kaspersky researchers noted that there were multiple versions of the infected ASUS Live Update binaries which were aimed at specific users. The targets were detected based on a hardcoded list of MAC addresses defined in the backdoored samples. The malicious code ran for those users whose network adapter’s MAC address was found in the list.

Kaspersky researchers had reportedly found around 600 MAC addresses from over 200 backdoored samples used in the campaign. Kaspersky released a separate tool and a web page where users could check if their MAC address was part of the target list.

List of impacted MAC addresses

To make it easier for enterprises to search through the target list, Australian security firm Skylight’s CTO Shahar Zini shared the full list of nearly 583 MAC addresses out of the 619 targeted in the ASUS breach.

“If information regarding targets exists, it should be made publicly available to the security community so we can better protect ourselves,” Skylight stated, in a blog post announcing the release of the list.

With this list being made public, security professionals from various enterprises can bulk compare the affected addresses with their enterprise devices to check for any exposure.

How were the MAC addresses found?

Skylight researchers went through a lengthy process to extract the list from the offline tool released by Kaspersky. Firstly, the researchers disassembled the tool using IDA, following which they found the list of MAC addresses but in an encrypted form. The list was protected using a salted hash algorithm.

To crack the encryption with brute force, the researchers used a powerful AWS instance running a modified version of HashCat password cracking tool to brute force 583 MAC addresses within an hour.

“Enter Amazon’s AWS p3.16xlarge instance. These beasts carry eight (you read correctly) of NVIDIA’s V100 Tesla 16GB GPUs. The entire set of 1300 prefixes was brute-forced in less than an hour,” the researchers wrote, describing the process.

What actions were taken by ASUS?

Before the disclosure of the attack campaign, Kaspersky informed ASUS about it on January 31, 2019. ASUS recently released a new update for the Live Update tool. It also added new security verification mechanisms to prevent any further attacks.

The company also admitted that an unknown group of hackers gained access to its servers between June 2018 to November 2018.

All ASUS users are first advised to check if they are affected by the backdoored version of the software. The company released a diagnostic tool to check for the infection. For users whose MAC addresses are present in the target list, ASUS recommends performing a factory reset to get rid of the backdoor and wipe the system clean.

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket