Dec 2
/
Latest News
Everest Ransomware Group Alleges ASUS Breach, Claims 1TB Data Theft
The Everest ransomware group has announced a new claim that ASUS, one of the world’s largest hardware and electronics manufacturers, has been compromised. In a post on the group’s dark web leak site, Everest asserts that it has obtained more than 1 terabyte of stolen data, allegedly including proprietary “camera source code.”
This term likely refers to firmware or software tied to ASUS devices with built-in cameras, such as laptops and smartphones. Such code could encompass low-level camera module controls, internal drivers, or even full applications related to image processing and device integration.
The group has demanded that ASUS contact them via Qtox, an encrypted messaging platform, and has imposed a 21-hour deadline for response. No ransom amount has been disclosed, and the sensitivity of the stolen data remains unclear.
This announcement follows a string of recent claims by Everest, which in the past two weeks alone has taken credit for attacks on Under Armour, Brazil’s Petrobras, and Spain’s Iberia airline. Those incidents reportedly involved user data, internal documents, and what the group described as full network access.
ASUS has yet to confirm or deny the alleged breach. Hackread.com has reached out to the company for comment and will provide updates as more information emerges.
The company, globally recognized for its PCs, motherboards, and consumer electronics, has faced serious cyberattacks before. In 2019, ASUS confirmed that its Live Update utility had been compromised in the ShadowHammer incident, an attack believed to have been state-backed.
If Everest’s latest claim proves accurate, this would mark the second major compromise of ASUS’s infrastructure in recent years. For now, the scope and credibility of the incident remain unverified.
This term likely refers to firmware or software tied to ASUS devices with built-in cameras, such as laptops and smartphones. Such code could encompass low-level camera module controls, internal drivers, or even full applications related to image processing and device integration.
The group has demanded that ASUS contact them via Qtox, an encrypted messaging platform, and has imposed a 21-hour deadline for response. No ransom amount has been disclosed, and the sensitivity of the stolen data remains unclear.
This announcement follows a string of recent claims by Everest, which in the past two weeks alone has taken credit for attacks on Under Armour, Brazil’s Petrobras, and Spain’s Iberia airline. Those incidents reportedly involved user data, internal documents, and what the group described as full network access.
ASUS has yet to confirm or deny the alleged breach. Hackread.com has reached out to the company for comment and will provide updates as more information emerges.
The company, globally recognized for its PCs, motherboards, and consumer electronics, has faced serious cyberattacks before. In 2019, ASUS confirmed that its Live Update utility had been compromised in the ShadowHammer incident, an attack believed to have been state-backed.
If Everest’s latest claim proves accurate, this would mark the second major compromise of ASUS’s infrastructure in recent years. For now, the scope and credibility of the incident remain unverified.
Executive IT Forums, Inc.
Educational Programs on Information Technology, Governance, Risk Management, & Compliance (GRC).
Our Newsletter
Get regular updates on CPE programs, news, and more.
Thank you!
Copyright © 2025 Executive IT Forums, Inc. All Rights Reserved.
Get started
Let us introduce our school
Write your awesome label here.