Article Details

Scrape Timestamp (UTC): 2025-12-05 14:56:57.646

Source: https://www.theregister.com/2025/12/05/asus_supplier_hack/

Original Article Text

Click to Toggle View

Asus supplier hit by ransomware attack as gang flaunts alleged 1 TB haul. Laptop maker says a vendor breach exposed some phone camera code, but not its own systems. Asus has admitted that a third-party supplier was popped by cybercrims after the Everest ransomware gang claimed it had rifled through the tech titan's internal files. In a statement, Asus said a supplier "was hacked" and the incident "affected some of the camera source code for Asus phones," but insisted there was "no impact" on its own products, internal systems, or customer privacy. The hardware maker added it is "strengthening supply chain security in compliance with cybersecurity standards," without naming the compromised vendor or specifying exactly what code was taken. The confession comes after Everest, a long-running ransomware and extortion crew known for targeting major vendors, claimed it had looted 1 TB of data from Asus, ArcSoft, and Qualcomm, and published screenshots of what it said were stolen documents. In a post on its dark web leak site, seen by The Register, Everest said: "Files contain this information and much more: Binary segmentation modules, Source code & patches, RAM dumps & memory logs, AI models & weights, OEM internal tools & firmware, Test videos, Calibration & dual-camera data, Image datasets, Crash logs & debug reports, Evaluation & performance reports, HDR, fusion, post processing data, Test APKs, experimental apps, Scripts & automation, Small config binary calibration files." Asus did not confirm Everest's wider claims and framed the issue as confined to a single, unnamed supplier whose compromised environment hosted camera-related code. The company has yet to say whether the stolen material was proprietary Asus content or data belonging to other firms listed by the gang, and the Zenfone maker did not respond to The Register's questions.  The disclosure lands at an awkward moment for Asus, as it comes just weeks after researchers warned that roughly 50,000 of its routers had been commandeered in what appears to be a China-linked campaign targeting vulnerable firmware. That intrusion, detailed by SecurityScorecard's STRIKE team, saw attackers quietly amassing tens of thousands of Asus devices into a botnet capable of traffic manipulation and further compromise. While the two incidents are unrelated, this latest breach adds fresh scrutiny to the company's security posture and the resilience of its development pipeline at a time when its networking gear is already under active exploitation.

Daily Brief Summary

CYBERCRIME // Asus Supplier Breach Exposes Camera Code Amid Ransomware Claims

Asus confirmed a third-party supplier was compromised by the Everest ransomware group, affecting some camera source code for Asus phones.

The hardware giant stated there was no impact on its own systems, products, or customer privacy, focusing the breach on the supplier.

Everest claims to have exfiltrated 1 TB of data from Asus, ArcSoft, and Qualcomm, including source code, AI models, and internal tools.

Asus is enhancing its supply chain security to align with cybersecurity standards, though it did not disclose the vendor or specific stolen content.

The breach coincides with recent reports of a separate attack on Asus routers, heightening scrutiny on the company's overall security measures.

This incident raises concerns about the robustness of supply chain security and the potential exposure of proprietary or sensitive data.

The situation underscores the need for robust vendor management and proactive security practices to mitigate third-party risks.