[ad_1]
ESET Analysis
This is a narrative of how an evaluation of a supposed sport cheat became the invention of a robust UEFI menace
12 Jul 2023
•
,
1 min. learn
In the direction of the top of 2022 an unknown menace actor boasted on an underground discussion board that they’d created a brand new and highly effective UEFI bootkit known as BlackLotus. Its most distinctive function? It might bypass UEFI Safe Boot – a function constructed into all trendy computer systems to forestall them from operating unauthorized software program.
What at first seemed like a fable – particularly on a completely up to date Home windows 11 system – has became actuality a number of months later, when ESET researchers discovered a pattern that completely matched this essential function in addition to all different attributes of the marketed bootkit.
On this episode of ESET Analysis podcast, ESET Distinguished Researcher and host of this podcast Aryeh Goretsky talks to ESET Malware Researcher Martin Smolár about how he found the menace and what the primary findings of his evaluation have been.
Within the dialogue, Martin reveals that he initially thought of the BlackLotus pattern to be a sport cheat and describes the second when he realized that he had discovered one thing far more harmful. To keep away from a standard false impression, Martin additionally explains the distinction between malicious UEFI firmware implants and threats that “solely” goal the EFI partition. To make the data actionable for our listeners, the ultimate a part of the dialogue explores the prevention and mitigation of UEFI assaults.
For extra particulars similar to who is perhaps affected by BlackLotus or how a menace actor would possibly get hold of the bootkit, hearken to the entire episode of ESET Analysis podcast on Spotify, Google Podcasts, Apple Podcasts, or PodBean. And when you like what you hear, subscribe for extra.
[ad_2]