OK, I'll bite: Why is the list of MAC addresses targeted in the compromised Asus update treated as secret sauce? Protecting Kaspersky revenue? https://github.com/countercept/shadowhammer …pic.twitter.com/xTP8FEDV7D
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Per the original article, the original malware has a hard-coded list of targeted MAC address MD5 hashes. The Kaspersky tool uses a sha256 of a string generated by concatenating some magic dword and the mac address 10,000 times.
Ah, I missed the specific mechanism in the article (it's been a long day so I scan-read it). Weird.
Maybe one of their clients is a vendor that was directly affected and they're trying to keep their name out of the news?
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.