![]() ![]() Previously discovered bootkits such as CosmicStrand, MosaicRegressor, and MoonBounce work by targeting the UEFI firmware stored in the flash storage chip. It’s located in an SPI-connected flash storage chip soldered onto the computer motherboard, making it difficult to inspect or patch. As the mechanism that bridges a PC’s device firmware with its operating system, the UEFI is an OS in its own right. These sophisticated pieces of malware target the UEFI-short for Unified Extensible Firmware Interface-the low-level and complex chain of firmware responsible for booting up virtually every modern computer. Researchers on Wednesday announced a major cybersecurity find-the world’s first-known instance of real-world malware that can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.ĭubbed BlackLotus, the malware is what’s known as a UEFI bootkit. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |