![asus live update malware asus live update malware](https://cdn2.hubspot.net/hubfs/5129222/Imported_Blog_Media/cyber-security-1805246_1280-590x314-1.png)
Keep reading to find out how to check whether a computer is infected by the ASUS update malware. This will leave you to wonder whether or not you are safe.
ASUS LIVE UPDATE MALWARE SOFTWARE
The process known as ArmouryLiveUpdate.exe belongs to software ROG Armoury by ASUSTeK Computer (Description: ArmouryLiveUpdate.exe is not essential for the Windows OS and causes relatively few problems.
![asus live update malware asus live update malware](https://windows-cdn.softpedia.com/screenshots/thumbs/ASUS-Live-Update-thumb.png)
If the MAC addresses of the affected system matched the list, the malware. ArmouryLiveUpdate.exe file information ArmouryLiveUpdate.exe process in Windows Task Manager. Nicknamed as ShadowHammer, Kaspersky stated that the hacker somehow has a specific list of targets involving 600 systems in which the malware can identify using their MAC addresses.
ASUS LIVE UPDATE MALWARE PC
According to researchers at Kaspersky, who have dubbed the attack Operation ShadowHammer, malicious hackers managed to plant the malware on Asus’s. Asus has released a free tool that can help you determine whether your PC was targeted by a newly uncovered supply chain attack on the companys computers. Why on earth would Asus want to do such a thing They didn’t. However, between June and November last year, more than one million users were affected worldwide. Subsequently, the hackers have then injected a backdoor into the ASUS Live Update utility. Hundreds of thousands of Asus PCs may have been infected with malware installed by Asus’s own automatic Live Update tool. ASUS says it has released a fix for the Live Update utility that threat actors abused in Operation ShadowHammer supply chain attack to deliver malware to hundreds of users. Only about 600 systems were targeted originally using their Media Access Control addresses (a unique identifier for digital devices). The attack was then discovered in late January and was reported first by Motherboard, a tech publication. This means that it was signed with an authentic ASUS certificate (used to test the legitimacy and credibility of new code). How was this possible? The hackers subtly modified a valid 2015 ASUS update and pushed it to users.
![asus live update malware asus live update malware](https://www.extremetech.com/wp-content/uploads/2019/03/asus-laptop-640x353.jpg)
The ASUS Live Update tool, which delivers UEFI, BIOS, and software updates to PCs, was compromised and used to send malware that granted backdoor access to the computers of unsuspecting users. Do you own an ASUS computer? Then you might have heard of a supply chain attack named Operation ShadowHammer.