A brand new declare by the Everest ransomware group means that ASUS, one of many world’s largest {hardware} and electronics corporations, has been compromised. In keeping with a put up on the group’s darkish net leak website, they’re in possession of greater than 1TB of stolen knowledge, which they are saying consists of digicam supply code.
On this case, “Digital camera Supply Code” doubtless refers to proprietary firmware or software program utilized in ASUS units with built-in cameras, comparable to laptops or smartphones. This might embrace low-level management code for digicam modules, inside drivers, and even whole purposes tied to picture processing or gadget integration.
The group is demanding that ASUS contact them via Qtox, an encrypted messaging platform, and has given the corporate a 21-hour deadline to reply. No ransom quantity has been made public, and there’s no clear indication but of the precise contents or sensitivity of the alleged knowledge.
This declare provides to a sequence of latest bulletins by Everest, which up to now two weeks alone have claimed duty for assaults on high-profile organisations, together with Below Armour, Brazil’s Petrobras, and Spain’s Iberia airline. These incidents concerned consumer knowledge, inside documentation, and what the group described as full community entry.
ASUS has not but confirmed or denied the breach. Hackread.com has reached out to the corporate for remark and can replace this story as extra particulars turn out to be obtainable.
ASUS, an organization recognized globally for its PCs, motherboards, and shopper electronics, has been focused earlier than by menace actors. In 2019, the corporate confirmed that attackers had compromised its Stay Replace utility in what later grew to become often known as ShadowHammer, an assault believed to be state-backed.
If this new declare proves credible, it could be the second vital compromise of ASUS’s infrastructure lately. Till there’s affirmation or denial from the corporate, the scope of the incident stays unverified.
Hackread.com will proceed monitoring the state of affairs for updates.

