Asus Data Breach: Another Major Company Extorted By The Everest Ransomware Group

By Carl | Published on December 3, 2025

Cybercrime

The notorious Everest ransomware group has issued a public threat to the global electronics giant ASUS, claiming to possess over a terabyte of stolen data. Among the alleged haul is what the attackers refer to as "camera source code," which could pose significant risks to the company's product security. This claim was made in a post on the group's dark web forum, where a countdown clock is prominently displayed, ticking down the hours until the group promises to release the stolen information. The ominous timer adds pressure on ASUS, intensifying the sense of urgency as the deadline approaches. While the specifics of the compromised data remain unclear, the growing threat from Everest, known for its high-profile attacks, suggests that the tech company could be facing another major breach.

About the Everest Group

The Everest Ransomware group, often know just as "Everest," has quickly emerged as one of the most prolific and dangerous cybercriminal organizations in the world. Known for its aggressive tactics and high-profile targets, the group has been behind major breaches involving companies, most recently involving Sweedens largest electrical grid operator. The group first emerged in 2020, starting out as a data exfiltration group, quickly migrating to more extreme, double extortion tactics like the most recent one involving asus.

Breaching Asus

The latest threat to ASUS comes from the Everest Ransomware group, which claims to have stolen over a terabyte of data from the company. Among the files allegedly stolen, Everest says there’s “camera source code,” which could involve sensitive software or firmware related to ASUS devices with built-in cameras. However, the details are still unclear, as the attackers have not shared any actual data samples to verify their claims. What’s more concerning, though, is the countdown clock posted alongside the ransom demand. It’s a common tactic designed to ramp up pressure, giving ASUS a limited window. The group claims that if ASUS does not respon in 21 hours then the data will be leaked

While the specifics of how Everest gained access to ASUS systems are still unknown, it’s likely the group exploited vulnerabilities or weaknesses in the company’s network. Everest has a history of targeting large organizations with sophisticated attacks, often using a combination of phishing, social engineering, and zero‑day exploits. Whether this latest breach follows a similar pattern remains to be seen, but the attackers' reputation for delivering on their threats adds weight to their claims.

Countdown Clock

The lack of transparency from ASUS about this latest breach is definitely concerning, especially given their history with similar attacks. Most notably, the 2019 ShadowHammer incident, where ASUS’s Live Update utility was compromised, raises questions about how well the company is protecting its infrastructure. While it’s still unclear just how much data has been stolen or what exactly it includes, Everest Ransomware’s threat should not be taken lightly. With the group’s track record of following through on its demands, the situation is far from ordinary. Until ASUS acknowledges the breach and provides more clarity, the extent of the damage remains uncertain.

Conclusion

This breach and subsequent extortion comes as no surprise to anyone that has been following cybersecurity news in recent times. Cybercriminal groups have been getting more brazen over time, protected by their masked identities on the internet. The countdown clock is a bit more flashy than usual, but not unheard off. The most concerning detail from this situation is that we do not know the extent of the data breach and the impact if any to asus's customers.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!