Menu
![]() Alongside Kaspersky’s recent discovery of the unrelated FinSpy bootkit, it is now safe to say that real-world UEFI threats are no longer limited to SPI flash implants, as used by Lojax. ![]() ![]() The bootkit, which we’ve named ESPecter, can bypass Windows Driver Signature Enforcement to load its own unsigned driver, which facilitates its espionage activities. ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012ĮSET researchers have analyzed a previously undocumented, real-world UEFI bootkit that persists on the EFI System Partition (ESP).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |