Keep your eyes on these

VERY IMPORTANT

Security Articles

RSS

UEFI threats moving to the ESP: Introducing ESPecter bootkit

released on 2021-10-06 @ 01:15:38 PM
ESET researchers analyze a previously undocumented, real-world UEFI bootkit that persists on the EFI System Partition (ESP). The bootkit, which we’ve named ESPecter, can bypass Windows Driver Signature Enforcement to load its own unsigned driver, which facilitates its espionage activities. Alongside Kaspersky’s recent discovery of the unrelated FinSpy bootkit, it is now safe to say that real-world UEFI threats are no longer limited to SPI flash implants, as used by Lojax.