ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit

Cyber Security

Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution

As Unified Extensible Firmware Interface (UEFI) replaced legacy BIOS as the leading technology embedded into chips of modern computers and devices, it became vital to the security of the pre-OS environment and to the loading of the operating system. It’s no surprise that such a widespread technology represents a tempting target for threat actors in their search for ultimate persistence.

The latest malware found to be targeting UEFI is ESPecter, a bootkit that persists in the form of a patched Windows Boot Manager as an ESP implant. It is only the second-ever found malware of this sort, identified on a compromised device “accompanied” by a keylogging and data-stealing component.

Listen to the latest episode of ESET Research podcast where ESET Distinguished Researcher Aryeh Goretsky interviews ESET Malware Researcher Martin Smolár and ESET Head of Threat Research Jean-Ian Boutin about ESPecter, Lojax, and other threats targeting UEFI.

If you enjoyed listening to the discussion, subscribe to the ESET Research podcast on any of the popular podcast platforms including Spotify, Google Podcasts, Apple Podcasts, and PodBean.

Products You May Like

Articles You May Like

Twitter ends free SMS 2FA: Here’s how you can protect your account now
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
S3 Ep127: When you chop someone out of a photo, but there they are anyway…
Google Pixel phones had a serious data leakage bug – here’s what to do!
Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips

Leave a Reply

Your email address will not be published. Required fields are marked *