In a sophisticated targeted espionage operation, hackers infected tens of thousands of computers from the Taiwanese vendor ASUS with malicious software using the company's online automatic update service, security researchers reported Monday.
Kaspersky Lab said it detected 57,000 infections among customers of its antivirus software. It estimates that the exploit likely affected over 1 million computers from the world's No. 5 computer company.
It designed the malware to open a "backdoor" for intruders in the infected machines, researchers said.
About 50 percent of the affected Kaspersky anti-virus software customers were in Russia, Germany and France, the company said. The U.S. accounted for less than 5 percent.
A Symantec spokeswoman said about 13,000 of its antivirus customers received the malicious updates.
The so-called supply chain attack was first reported by the online news site Motherboard.
Kaspersky said the infected software was on ASUS's Live Update servers from June they signed to November with legitimate certificates. It did not detect the malware until January when new capabilities were added to its anti-virus software; the company said.
Kaspersky said its researchers determined that it programmed the malware for surgical espionage when they saw that they designed it to accept a second malware payload for specific computers based on unique identifiers of their network connections. It identified over 600 computers programmed to receive the payload.
In a blog post and answers to emailed questions, the company said the nature of the second malware payload was unknown because the server that delivered it was no longer active.
Kaspersky said while is too early to know who was behind the operation, it is consistent with a 2017 incident blamed by Microsoft on a Chinese state-backed group the company calls BARIUM.
ASUS did not immediately respond to two emailed requests seeking comment.
In order to fulfill the basic functions of our service, the user hereby agrees to allow Xiaomi to collect, process and use personal information which shall include but not be limited to written threads, pictures, comments, replies in the Mi Community, and relevant data types listed in Xiaomi's Private Policy. By selecting "Agree", you agree to Xiaomi's Private Policy and Content Policy .