Everest Ransomware Claims ASUS Breach and 1TB Data Theft

Everest Ransomware Claims ASUS Breach and 1TB Data Theft

A new claim by the Everest ransomware group suggests that ASUS, one of the world’s largest hardware and electronics companies, has been compromised. According to a post on the group’s dark web leak site, they are in possession of more than 1TB of stolen data, which they say includes camera source code.

In this case, “Camera Source Code” likely refers to proprietary firmware or software used in ASUS devices with built-in cameras, such as laptops or smartphones. This could include low-level control code for camera modules, internal drivers, or even entire applications tied to image processing or device integration.

Everest Ransomware claiming ASUS breach (Image credit: Hackread.com)

The group is demanding that ASUS contact them through Qtox, an encrypted messaging platform, and has given the company a 21-hour deadline to respond. No ransom amount has been made public, and there’s no clear indication yet of the specific contents or sensitivity of the alleged data.

This claim adds to a series of recent announcements by Everest, which in the past two weeks alone have claimed responsibility for attacks on high-profile organisations, including Under Armour, Brazil’s Petrobras, and Spain’s Iberia airline. Those incidents involved user data, internal documentation, and what the group described as full network access.

ASUS has not yet confirmed or denied the breach. Hackread.com has reached out to the company for comment and will update this story as more details become available.

Source: https://hackread.com/everest-ransomware-asus-breach-1tb-data/

ASUS cybersecurity rating report: https://www.rankiteo.com/company/asus

"id": "ASU1764705548",
"linkid": "asus",
"type": "Ransomware",
"date": "12/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'incident': {'affected_entities': [{'customers_affected': None,
                                     'industry': 'Hardware and Electronics',
                                     'location': None,
                                     'name': 'ASUS',
                                     'size': 'Large',
                                     'type': 'Corporation'}],
              'data_breach': {'data_encryption': None,
                              'data_exfiltration': 'Yes',
                              'file_types_exposed': None,
                              'number_of_records_exposed': None,
                              'personally_identifiable_information': None,
                              'sensitivity_of_data': 'High (proprietary source '
                                                     'code)',
                              'type_of_data_compromised': 'Proprietary '
                                                          'firmware/software, '
                                                          'camera source code'},
              'description': 'A new claim by the Everest ransomware group '
                             'suggests that ASUS, one of the world’s largest '
                             'hardware and electronics companies, has been '
                             'compromised. The group claims to possess more '
                             'than 1TB of stolen data, including camera source '
                             'code for ASUS devices with built-in cameras. '
                             'ASUS has been given a 21-hour deadline to '
                             'respond via Qtox, an encrypted messaging '
                             'platform.',
              'impact': {'brand_reputation_impact': None,
                         'conversion_rate_impact': None,
                         'customer_complaints': None,
                         'data_compromised': '1TB of data, including camera '
                                             'source code',
                         'downtime': None,
                         'financial_loss': None,
                         'identity_theft_risk': None,
                         'legal_liabilities': None,
                         'operational_impact': None,
                         'payment_information_risk': None,
                         'revenue_loss': None,
                         'systems_affected': None},
              'initial_access_broker': {'backdoors_established': None,
                                        'data_sold_on_dark_web': None,
                                        'entry_point': None,
                                        'high_value_targets': None,
                                        'reconnaissance_period': None},
              'investigation_status': 'Ongoing',
              'motivation': 'Extortion',
              'post_incident_analysis': {'corrective_actions': None,
                                         'root_causes': None},
              'ransomware': {'data_encryption': None,
                             'data_exfiltration': 'Yes',
                             'ransom_demanded': None,
                             'ransom_paid': None,
                             'ransomware_strain': 'Everest'},
              'references': [{'date_accessed': None,
                              'source': 'Hackread.com',
                              'url': None}],
              'regulatory_compliance': {'fines_imposed': None,
                                        'legal_actions': None,
                                        'regulations_violated': None,
                                        'regulatory_notifications': None},
              'response': {'adaptive_behavioral_waf': None,
                           'communication_strategy': None,
                           'containment_measures': None,
                           'enhanced_monitoring': None,
                           'incident_response_plan_activated': None,
                           'law_enforcement_notified': None,
                           'network_segmentation': None,
                           'on_demand_scrubbing_services': None,
                           'recovery_measures': None,
                           'remediation_measures': None,
                           'third_party_assistance': None},
              'threat_actor': 'Everest Ransomware Group',
              'title': 'Everest Ransomware Group Claims ASUS Breach',
              'type': 'Ransomware'}}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.