![]() ![]() ![]() Some of the executable files, which were downloaded from the official domain of a reputable and trusted large manufacturer, contained apparent malware features. Our researchers named it “Operation ShadowHammer”. Now it is time to share more details about the research with our readers.Īt the end of January 2019, Kaspersky Lab researchers discovered what appeared to be a new attack on a large manufacturer in Asia. The topic was also one of the research announcements made at the SAS conference, which took place in Singapore on April 9-10, 2019. In late March 2019, we briefly highlighted our research on ShadowHammer attacks, a sophisticated supply chain attack involving ASUS Live Update Utility, which was featured in a Kim Zetter article on Motherboard.
0 Comments
Leave a Reply. |