Russian hackers are Watch Her True Story 9 Onlineupping the ante of their cyberattacks.
The next level of cyber warfare may not be here thanks to the latest weapon being utilized by Russian hackers.
SEE ALSO: Cryptocurrency exchange claimed it was 'practically impossible' to hack. It was hacked.Researchers with the cybersecurity company ESET have discovered what is believed to be the first known UEFI rootkit malware used in a cyber attack. In a blog post, ESET explains:
“The discovery of the first in-the-wild UEFI rootkit is notable for two reasons. First, it shows that UEFI rootkits are a real threat, and not merely an attractive conference topic. And second, it serves as a heads-up, especially to all those who might be in the crosshairs of Sednit. This APT group, also known as APT28, STRONTIUM, Sofacy and Fancy Bear, may be even more dangerous than previously thought.”
If the name “Fancy Bear” sounds familiar, it’s because they’re the hacking group embedded in Russia’s GRU intelligence agency that has been found responsible for the 2016 DNC emails hack and various misinformation campaigns surrounding the US elections. Earlier this summer, special counsel Robert Mueller indicted a number of Russian nationals with the Fancy Bear hacking group for their role in these attacks.
Previously these Russian hackers had deployed various methods ranging from social engineering to spear-phishing emails as the means of their attacks. This discovery of sophisticated rootkit malware being deployed takes this all to a whole new level.
This instance of malware has been dubbed LoJax as it copies portions of LoJack’s Absolute LoJack software, which is intended to find stolen laptops and remotely wipe the hard drive of a missing computer. Because of this, this rootkit malware only affects PCs.
The main issue with rootkit malware is that it embeds itself into a computer’s firmware and can’t be easily removed. Reinstalling the operating system or replacing the hard drive of the computer will not cut off the hackers’ access to the device. In fact, according to ESET, the main two options of recourse once infected is to manually reflash a computer’s memory with new firmware, which is a fairly difficult, technical process, or to just completely replace the computer’s motherboard. Basically, if a computer is compromised by LoJax, your best option is probably to toss that computer in the trash.
According to ESET, different components of the LoJax malware has already been discovered in attacks deployed against “a few government organizations in the Balkans as well as in Central and Eastern Europe. ESET’s investigation concluded that the hackers were ”successful at least once in writing a malicious UEFI module into a system’s SPI flash memory.”
This discovery should serve as a warning that the hacking threat is only escalating as malicious actors look to fool-proof future methods of attack.
Topics Cybersecurity Politics
Announcing Our #ReadEverywhere ContestColonized on Every Level: An Interview with Dodie Bellamy by Christopher HiggsBoule de SuifSwinging for the FencesThe Morning News Roundup for July 25, 2014Still Slacking After All These YearsAnnouncing Our #ReadEverywhere ContestThis Week’s Staff Picks: Moo, Maine, MalfeasanceJames Berry, Celebrity ExecutionerHappy Birthday, Anne Fadiman!Unpleasant Vibrators Need Not ApplyRobert Stone, Tabloid WriterThe Lean, Mean, StarThe Vale of SoulSubscribe to The Paris Review and the LRBTaste It! by Dan PiepenbringLes Combats ModernesParanormal ActivityThe Morning News Roundup for August 20, 2014The Lean, Mean, Star Explore the First Reads picks for June Come for Elon Musk, best not miss: The problem with 'Muskism' Alibaba opens new campuses in Hangzhou and Beijing on the same day · TechNode SpaceX's Starlink satellite launch in pictures China’s Chery launches answer to Tesla’s Model Y, Audi Q5L · TechNode Apple made a mistake with the M2 iPad Air specs — but here’s why you shouldn’t worry Wordle today: The answer and hints for June 5 West Indies vs. Uganda 2024 livestream: Watch T20 World Cup for free China’s SAIC says it has ‘fully cooperated’ with EU regulators · TechNode Price war shows little impact on JD retail margin as e Baidu’s core advertising remains weak in Q1, GenAI boost cloud revenue · TechNode TSMC’s A16 process to run without ASML's next Meituan’s KeeTa tops Hong Kong market by order numbers · TechNode NASA successfully launches mission to slam into an asteroid Australia vs. Oman 2024 livestream: Watch T20 World Cup for free Xiaomi appoints two female senior executives simultaneously for the first time · TechNode Stephen Colbert boldly jokes about SpaceX capsule's broken toilet Jeff Bezos' Blue Origin plans to build a 'business park' in space Bees scream like mammals when giant hornets attack Oman vs. Scotland 2024 livestream: Watch T20 World Cup for free
1.9054s , 10133.6015625 kb
Copyright © 2025 Powered by 【Watch Her True Story 9 Online】,Inspiration Information Network