Tag Archives: uefi

Secure Boot-neutering PKfail debacle is more prevalent than anyone knew

Getty Images reader comments 12 A supply chain failure that compromises Secure Boot protections on computing devices from across the device-making industry extends to a much larger number of models than previously known, including those used in ATMs, point-of-sale terminals, and voting machines. The debacle was the result of non-production test platform keys used in… Read More »

Secure Boot is completely broken on 200+ models from 5 big device makers

sasha85ru | Getty Imates reader comments 114 In 2012, an industry-wide coalition of hardware and software makers adopted Secure Boot to protect against a long-looming security threat. The threat was the specter of malware that could infect the BIOS, the firmware that loaded the operating system each time a computer booted up. From there, it… Read More »

Critical vulnerability affecting most Linux distros allows for bootkits

reader comments 10 Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they’re hard to detect or remove. The vulnerability resides in shim, which in the context… Read More »

New UEFI vulnerabilities send firmware devs industry wide scrambling

Nadezhda Kozhedub reader comments 56 UEFI firmware from five of the leading suppliers contains vulnerabilities that allow attackers with a toehold in a user’s network to infect connected devices with malware that runs at the firmware level. The vulnerabilities, which collectively have been dubbed PixieFail by the researchers who discovered them, pose a threat mostly… Read More »

Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

Getty Images reader comments 152 Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms. The attack—dubbed LogoFAIL by the researchers… Read More »

Microsoft will take nearly a year to finish patching new 0-day Secure Boot bug

reader comments 21 with Earlier this week, Microsoft released a patch to fix a Secure Boot bypass bug used by the BlackLotus bootkit we reported on in March. The original vulnerability, CVE-2022-21894, was patched in January, but the new patch for CVE-2023-24932 addresses another actively exploited workaround for systems running Windows 10 and 11 and… Read More »

Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw

Aurich Lawson | Getty Images reader comments 144 with Share this story Researchers on Wednesday announced a major cybersecurity find—the world’s first-known instance of real-world malware that can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows. Dubbed BlackLotus, the malware… Read More »

300+ models of MSI motherboards have Secure Boot turned off. Is yours affected?

reader comments 14 with 0 posters participating Share this story Secure Boot is an industry standard for ensuring that Windows devices don’t load malicious firmware or software during the startup process. If you have it turned on—as you should in most cases, and it’s the default setting mandated by Microsoft—good for you. If you’re using… Read More »

Lenovo driver goof poses security risk for users of 25 notebook models

Getty Images reader comments with 0 posters participating Share this story More than two dozen Lenovo notebook models are vulnerable to malicious hacks that disable the UEFI secure boot process and then run unsigned UEFI apps or load bootloaders that permanently backdoor a device, researchers warned on Wednesday. At the same time that researchers from… Read More »

Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us

Enlarge (credit: Getty Images) Researchers have unpacked a major cybersecurity find—a malicious UEFI-based rootkit used in the wild since 2016 to ensure computers remained infected even if an operating system is reinstalled or a hard drive is completely replaced. The firmware compromises the UEFI, the low-level and highly opaque chain of firmware required to boot up… Read More »