Everest Ransomware Dumps Full 1TB of ASUS Stolen Data
After ASUS missed ransom deadline, Everest releases complete data trove including ROG source code, Qualcomm SDKs, and ArcSoft files on cybercrime forums.
The Russia-linked Everest ransomware group has released the complete 1TB dataset allegedly stolen from ASUS after the hardware manufacturer failed to meet the group's ransom demands. The data is now circulating on Russian-language cybercrime forums including Exploit and DamageLib.
ASUS confirmed in December that a third-party vendor was breached, exposing some phone camera source code. The company maintained that no internal systems, products, or user data were affected. But the scope of the leaked files suggests the incident was more consequential than that initial statement implied.
What Got Leaked
The dumped files span multiple ASUS product lines and appear to include:
Mobile device SDKs and source code:
- Camera firmware and software development kits
- ROG gaming phone materials (ROG 5, ROG 6, ROG 7)
- ZenFone (ZF series) development resources
- Test patches for Qualcomm chipsets
Third-party vendor materials:
- ArcSoft imaging software components
- Qualcomm-related development files
- Calibration data and memory dumps
Nine specific files have been identified as potentially belonging to Qualcomm and ArcSoft rather than ASUS directly. The presence of third-party materials in the dump suggests the compromised vendor had access to code from multiple hardware and software partners.
ASUS Downplayed the Breach
When Everest first claimed responsibility for the attack in early December, ASUS issued a statement acknowledging that "a supplier breach exposed some phone camera source code" but insisted the incident "did not affect products, internal systems, or user data."
That characterization looks increasingly incomplete. Development kits for flagship gaming phones, calibration data, and memory dumps all carry value for competitors, counterfeiters, and attackers looking to find exploitable flaws in ASUS products. The "phone camera source code" framing undersold what was actually compromised.
ASUS says it's reinforcing supply-chain security in response. That's the right move, but it comes after the damage is done.
Everest's Growing Victim List
The Everest ransomware operation has accumulated more than 250 victims since 2023, with over 100 claimed in the past 12 months alone. The group made headlines over Christmas by claiming a breach at Chrysler with another 1TB of allegedly stolen data.
The operation is believed to have ties to Russia, though like most ransomware groups, it operates across jurisdictions in ways that make attribution and law enforcement action difficult.
Everest's tactics follow standard ransomware playbook: exfiltrate data, encrypt systems where possible, set a deadline, and publish stolen materials when victims don't pay. The group has shown willingness to dump full datasets rather than just samples—a strategy that maximizes pressure on current victims while demonstrating credibility to future targets.
Supply Chain Security Failures
The ASUS breach underscores how vendor relationships create attack surface that's difficult to monitor and control. ASUS's own systems may well be secure. But if a consulting firm, development partner, or supplier has access to sensitive materials and weak security, the primary organization inherits that risk.
This isn't a new problem. Supply chain attacks have become increasingly common, and the technology sector's reliance on complex vendor ecosystems means most organizations have limited visibility into how their data is handled once it leaves their direct control.
For ASUS, the immediate concern is assessing whether the leaked materials create risks for deployed products. Source code access could potentially help attackers identify vulnerabilities in shipping devices—though that's speculative without knowing exactly what was exposed.
What Comes Next
The data is out. Everest has no further incentive to withhold it, and multiple copies are now circulating on forums where security researchers, criminals, and curious observers all have access.
ASUS faces reputational damage and possible competitive harm if the leaked materials provide insight into proprietary technologies. Qualcomm and ArcSoft may face questions about their own vendor security practices and how their code ended up in a dataset exposed through an ASUS supplier.
For organizations watching from the sidelines, the lesson is familiar but worth repeating: your security posture is only as strong as your weakest vendor. Due diligence on third-party security isn't optional, and contracts should specify data handling requirements along with breach notification obligations.
The alternative is learning about exposure the way ASUS did—from a ransomware group's leak site.
Related Articles
Everest Ransomware Claims 1TB Chrysler Data Theft on Christmas Day
Ransomware group says it exfiltrated over a terabyte of Chrysler customer data including Salesforce records and recall case narratives. Threatening to publish in days.
Dec 28, 2025ASML Breach Claim: 154 Databases and Encryption Keys Leaked
Threat actor '1011' posted alleged data from the semiconductor equipment giant to a Russian cybercrime forum. Security researchers are verifying the files.
Jan 7, 2026Dartmouth Breach Exposes 44,000 in Clop Oracle Campaign
Russian ransomware gang exploited CVE-2025-61882 to steal SSNs and financial data from the college. The same vulnerability hit Harvard, UPenn, and 100+ organizations.
Jan 7, 2026Canadian College Suspends Classes After Holiday Cyber Attack
Aurora College in Canada's Northwest Territories cancels all classes January 5-9 after cyber attack over Christmas break takes down servers, email, and e-learning systems.
Jan 5, 2026