Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

It is not best to swap horses while crossing the river. -- Abraham Lincoln


computers / alt.comp.os.windows-10 / Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw

SubjectAuthor
o Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaNewsKrawler

1
Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw

<tu59a7$3mc5m$1@paganini.bofh.team>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=69515&group=alt.comp.os.windows-10#69515

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!paganini.bofh.team!not-for-mail
From: newskr...@krawl.org (NewsKrawler)
Newsgroups: alt.comp.os.windows-10
Subject: Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw
Date: Mon, 6 Mar 2023 17:53:11 -0000 (UTC)
Organization: To protect and to server
Message-ID: <tu59a7$3mc5m$1@paganini.bofh.team>
Injection-Date: Mon, 6 Mar 2023 17:53:11 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3879094"; posting-host="nDb7tZ7UQVYri04syWnKjQ.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
Cancel-Lock: sha256:rR0Y+QiPxYJnlsh/B6H5QnLMoK6UgMZViOOUKPo9T7g=
X-Notice: Filtered by postfilter v. 0.9.3
 by: NewsKrawler - Mon, 6 Mar 2023 17:53 UTC

https://arstechnica.com/information-technology/2023/03/unkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/
Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw

The world's first-known instance of real-world malware that can hijack a
computer's boot process even when Secure Boot and other advanced
protections are enabled and running on fully updated versions of Windows.

Dubbed BlackLotus, the malware is what's known as a UEFI bootkit. These
sophisticated pieces of malware infect the UEFI (short for Unified
Extensible Firmware Interface) the low-level and complex chain of firmware
responsible for booting up virtually every modern computer. As the
mechanism that bridges a PC's device firmware with its operating system,
the UEFI is an OS in its own right. It's located in an SPI-connected flash
storage chip soldered onto the computer motherboard, making it difficult to
inspect or patch.

Because the UEFI is the first thing to run when a computer is turned on, it
influences the OS, security apps, and all other software that follows.
These traits make the UEFI the perfect place to run malware. When
successful, UEFI bootkits disable OS security mechanisms and ensure that a
computer remains infected with stealthy malware that runs at the kernel
mode or user mode, even after the operating system is reinstalled or a hard
drive is replaced.

As appealing as it is to threat actors to install nearly invisible and
unremovable malware that has kernel-level access, there are a few
formidable hurdles standing in their way. One is the requirement that they
first hack the device and gain administrator system rights, either by
exploiting one or more vulnerabilities in the OS or apps or by tricking a
user into installing trojanized software. Only after this high bar is
cleared can the threat actor attempt an installation of the bootkit.

The second thing standing in the way of UEFI attacks is UEFI Secure Boot,
an industry-wide standard that uses cryptographic signatures to ensure that
each piece of software used during startup is trusted by a computer's
manufacturer. Secure Boot is designed to create a chain of trust that will
prevent attackers from replacing the intended bootup firmware with
malicious firmware. If a single firmware link in that chain isn't
recognized, Secure Boot will prevent the device from starting.

While researchers have found Secure Boot vulnerabilities in the past, there
has been no indication that threat actors have ever been able to bypass the
protection in the 12 years it has been in existence. Until now.

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor