A new claim by the Everest ransomware group suggests that ASUS, one of the world’s largest hardware and electronics companies, has been compromised. According to a post on the group’s dark web leak site, they are in possession of more than 1TB of stolen data, which they say includes camera source code.
In this case, “Camera Source Code” likely refers to proprietary firmware or software used in ASUS devices with built-in cameras, such as laptops or smartphones. This could include low-level control code for camera modules, internal drivers, or even entire applications tied to image processing or device integration.
The group is demanding that ASUS contact them through Qtox, an encrypted messaging platform, and has given the company a 21-hour deadline to respond. No ransom amount has been made public, and there’s no clear indication yet of the specific contents or sensitivity of the alleged data.
This claim adds to a series of recent announcements by Everest, which in the past two weeks alone have claimed responsibility for attacks on high-profile organisations, including Under Armour, Brazil’s Petrobras, and Spain’s Iberia airline. Those incidents involved user data, internal documentation, and what the group described as full network access.
ASUS has not yet confirmed or denied the breach. Hackread.com has reached out to the company for comment and will update this story as more details become available.
ASUS, a company known globally for its PCs, motherboards, and consumer electronics, has been targeted before by threat actors. In 2019, the company confirmed that attackers had compromised its Live Update utility in what later became known as ShadowHammer, an attack believed to be state-backed.
If this new claim proves credible, it would be the second significant compromise of ASUS’s infrastructure in recent years. Until there is confirmation or denial from the company, the scope of the incident remains unverified.
Hackread.com will continue monitoring the situation for updates.
