![]()
Full Article: https://www.eset.com/us/about/newsr...cy-bear-to-target-governments-eset-discovers/
-
Spartan@HIDevolution Company Representative
-
Hey @Ultra Male your link goes to another article.
Interesting read, here is the PDF
http://cts.businesswire.com/ct/CT?i...&index=1&md5=7846ff619ceda134a10f72295faab436Last edited: Dec 27, 2018Dr. AMK likes this. -
Spartan@HIDevolution Company Representative
Thank for notifying me. I fixed the link and repped j00.Dr. AMK likes this. -
I always believed UEFI was designed to lockout user from it's computer , more than anything else. And I remember old BIOS had 100% foolproof security feature on my ancient desktop: except for small area for user data/settings, you could not flash, write to, or change BIOS until you manually short 2 pins to enable higher voltage necessary for writing operations. So unless the BIOS you were trying to flash was infected, there was no possible way to infect it without physical access to the computer. With UEFI it's just a matter of effort to find it's security holes and I'm sure there is more than one.
ESET Discovers the first-ever UEFI rootkit cyberattack
Discussion in 'Security and Anti-Virus Software' started by Spartan@HIDevolution, Dec 27, 2018.