The ASUS supply chain attack discovered by @kaspersky and outlined in this @motherboard article is a great example of why traditional signature based AV is NOT a defense against advanced threats. The first stage payload was only targeting about 600 machines. 1/6
4
25
4
54
And the machines were being targeted by MAC address. We don't know how the attackers came to learn the MAC addresses of the machines they were targeting - MAC addresses aren't exposed over the Internet. I'm honestly more interested in the targeting than the ASUS compromise. 2/6
2
2
1
13
So how did attackers get MAC addresses for targeting? A few ideas: 1. Previous supply chain attacks linking a particular ASUS machine to a given user. 2. Close access wireless surveys. Would love to know if these MAC addresses are for wireless adapters. 3/6
3
1
6
Replying to @MalwareJake
I’m going with #1 since the attackers clearly had access to Asus’ infrastructure already

Mar 25, 2019 · 3:00 PM UTC

1
1
Replying to @hal_pomeranz
Agree, but if some MAC addresses aren't ASUS, then the story changes a little.
1