Jump to content











Photo
- - - - -

LoJax: First UEFI rootkit found in the wild


  • Please log in to reply
No replies to this topic

#1 Nuno Brito

Nuno Brito

    Platinum Member

  • .script developer
  • 10545 posts
  • Location:boot.wim
  • Interests:I'm just a quiet simple person with a very quiet simple life living one day at a time..
  •  
    European Union

Posted 28 September 2018 - 09:51 AM

UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks, as they are hard to detect and able to survive security measures such as operating system reinstallation and even a hard disk replacement. Some UEFI rootkits have been presented as proofs of concept; some are known to be at the disposal of (at least some) governmental agencies. However, no UEFI rootkit has ever been detected in the wild – until we discovered a campaign by the Sednit APT group that successfully deployed a malicious UEFI module on a victim’s system.

 

https://www.welivese...y-sednit-group/

 

Nothing new to people around here, I guess we are used to boot sector viruses since the stone age. :lol:






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users