logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Lojax First Uefi Rootkit Found In The Wild Courtesy Of The Sednit Group Eset

  • SKU: BELL-7199144
Lojax First Uefi Rootkit Found In The Wild Courtesy Of The Sednit Group Eset
$ 31.00 $ 45.00 (-31%)

4.0

76 reviews

Lojax First Uefi Rootkit Found In The Wild Courtesy Of The Sednit Group Eset instant download after payment.

Publisher: ESET
File Extension: PDF
File size: 2.23 MB
Pages: 24
Author: ESET
Language: English
Year: 2018

Product desciption

Lojax First Uefi Rootkit Found In The Wild Courtesy Of The Sednit Group Eset by Eset instant download after payment.

Sednit also known as APT28, Sofacy, Strontium and Fancy Bear – has been operating since at least 2004, and has made headlines frequently in the past years: it is believed to be behind major, high profile attacks . For instance, several security companies [1] as well as the US Department of Justice [2] named the group as being responsible for the Democratic National Committee (DNC) hack just before the US 2016 elections . The group is also presumed to be behind the hacking of global television network TV5Monde [3], the World Anti-Doping Agency (WADA) email leak [4] and many others . Its targets are many and the group
has a diversified set of malware in its toolbox several of which we have documented previously [5],
but this white paper details the first time this group is known to have used a UEFI rootkit .
Key points in this white paper:
• Starting in at least early 2017, trojanized versions of an older userland agent of the popular
LoJack anti-theft software from Absolute Software were found in the wild . We call this trojanized LoJack agent LoJax . LoJack attracted a lot of attention in recent years as it implements a UEFI/BIOS module as a persistence mechanism .
• The presence of known Sednit tools alongside LoJax samples as well as the fact that some of the C&C servers used by these trojanized agents were part of an earlier Sednit network infrastructure allows us to link this UEFI rootkit to the Sednit group with high confidence .
• Along with the LoJax agents, tools with the ability to read systems’ UEFI firmware were found and in one case, this tool was able to dump, patch and overwrite part of the system’s SPI flash memory . This tool’s ultimate goal was to install a malicious UEFI module on a system whose SPI flash memory protections were vulnerable or misconfigured .
• This UEFI module has the responsibility to drop the LoJax agent on the system, making it the first Sednit UEFI rootkit identified . As it resides in the system’s firmware, it can survive a Windows re-install as well as a hard drive replacement .
• There was at least one case where this rootkit was successfully installed in a system’s SPI flash memory . To our knowledge, this is the first UEFI rootkit found in the wild .

Related Products

Lorax The Dr Seuss

4.7

36 reviews
$45.00 $31.00

Backward Glass Lomax David

5.0

78 reviews
$45.00 $31.00