feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
trending

PG&E substation fire in San Francisco

trending

Pat Bryant hospitalized after hit

trending

Lamar Jackson back injury

trending

School teens' swastika photo outrage

trending

Stefon Diggs injury update

trending

Zay Flowers surpasses 1000 yards

trending

AFC playoff picture updated

trending

Crosby passes Lemieux: Penguins points

trending

Josh Allen's MVP odds drop

Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2025 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

5 Dec

•

Summary

  • Ransomware group Everest claims over 1TB of data stolen.
  • Stolen data includes source code for Asus phone cameras.
  • Everest group demands minimum $700,000 for the data.
Asus Supplier Hack: 1TB Data Stolen, Camera Code Exposed

A ransomware group, Everest, has claimed responsibility for hacking an Asus supplier and exfiltrating over 1TB of data. The stolen information reportedly includes the source code for Asus phone cameras, along with internal tools and experimental applications. The group has publicly advertised the sale of this data on the dark web, setting a minimum price of $700,000.

Asus has confirmed the data breach affecting a supplier and acknowledged that some camera source code was compromised. However, the Taiwanese tech giant emphasized that this incident has not affected their products, internal systems, or user privacy. The company also stated it is reinforcing its supply chain security measures in line with cybersecurity standards.

The Everest group, active since 2020, is known for extorting victims by threatening to leak stolen data. They have previously targeted companies like Under Armour. The method of the breach into the Asus supplier's systems remains unclear, though Everest has a history of exploiting remote desktop systems, corporate VPNs, or using stolen credentials.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Everest is a Russian-speaking ransomware group active since 2020, known for stealing data and demanding payment or threatening to leak it.
The attackers claim to have stolen over 1TB of data, including source code for Asus phone cameras, internal tools, firmware, and experimental apps.
Asus states that the incident did not impact their products, internal company systems, or user privacy.

Read more news on

Technologyside-arrow

You may also like

Sherpa: Everest's Unsung Heroes Rise

5 hours ago • 4 reads

article image

Amputee Climbs Everest on Prosthetics

1 day ago • 45 reads

article image

AI Fights $76.5B Retail Return Fraud Ring

18 Dec • 13 reads

article image

Everest's Shame: Garbage Dump on World's Highest Peak

14 Dec • 28 reads

article image

Kauai Bans Foam Bodyboards to Protect Marine Life

13 Dec • 40 reads

article image