feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouIndiaIndia
You
bookmarksYour BookmarkshashtagYour Topics
Trending
trending

Heavy rain alert issued

trending

2026 MG Hector facelift launched

trending

Mahindra XUV 7XO pre-booking

trending

HSBC buyout Hang Seng proposal

trending

WBPSC Clerkship Mains admit card

trending

Snapchat woos Indian advertisers

trending

Avengers Doomsday trailer leaked online

trending

Vedanta shares surge after demerger

trending

Deepesh Devendran wrecks Pakistan U19

Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2025 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

5 Dec

•

Summary

  • Ransomware group Everest claims over 1TB of data stolen.
  • Stolen data includes source code for Asus phone cameras.
  • Everest group demands minimum $700,000 for the data.
Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

A ransomware group, Everest, has claimed responsibility for hacking an Asus supplier and exfiltrating over 1TB of data. The stolen information reportedly includes the source code for Asus phone cameras, along with internal tools and experimental applications. The group has publicly advertised the sale of this data on the dark web, setting a minimum price of $700,000.

Asus has confirmed the data breach affecting a supplier and acknowledged that some camera source code was compromised. However, the Taiwanese tech giant emphasized that this incident has not affected their products, internal systems, or user privacy. The company also stated it is reinforcing its supply chain security measures in line with cybersecurity standards.

The Everest group, active since 2020, is known for extorting victims by threatening to leak stolen data. They have previously targeted companies like Under Armour. The method of the breach into the Asus supplier's systems remains unclear, though Everest has a history of exploiting remote desktop systems, corporate VPNs, or using stolen credentials.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Everest is a Russian-speaking ransomware group active since 2020, known for stealing data and demanding payment or threatening to leak it.
The attackers claim to have stolen over 1TB of data, including source code for Asus phone cameras, internal tools, firmware, and experimental apps.
Asus states that the incident did not impact their products, internal company systems, or user privacy.

Read more news on

Technologyside-arrow

You may also like

Everest's Shame: Garbage Dump on World's Highest Peak

14 Dec • 12 reads

article image

Kauai Bans Foam Bodyboards to Protect Marine Life

13 Dec • 12 reads

article image

Freemans Catalogue: A Christmas Ritual Ends

10 Dec • 32 reads

article image

UK Simulates Deadly Virus Outbreak in Massive Drill

25 Nov • 68 reads

article image

Olympic Ski Champion Gut-Behrami Suffers Potential Career-Ending Knee Injury

21 Nov • 77 reads

article image