Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    WINDOWS    |    Bill Gates farts and we can ALL smell it    |    3,071 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,013 of 3,071    |
|    August Abolins to All    |
|    Unpatchable UEFI bootkit bypasses Secure    |
|    06 Mar 23 13:36:00    |
      MSGID: 2:221/1.58@fidonet 062a08e2       PID: OpenXP/5.0.57 (Win32)       CHRS: ASCII 1       TZUTC: -0500              >==================================================================<        ** Original area : "/grc/securitynow"        ** Original message from : PHolder+NNTP@gmail.com (Paul Holder)        ** Original message to :        ** Original date/time : 06 Mar 23, 12:48       >==================================================================<              https://arstechnica.com/information-technology/2023/03/unkillabl       -uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/              Researchers on Wednesday announced a major cybersecurity find?the       world?s first-known instance of real-world malware that can hijack a       computer?s boot process even when Secure Boot and other advanced       protections are enabled and running on fully updated versions of       Windows.              Dubbed BlackLotus, the malware is what?s known as a UEFI bootkit. These       sophisticated pieces of malware infect the UEFI?short for Unified       Extensible Firmware Interface?the low-level and complex chain of       firmware responsible for booting up virtually every modern computer. As       the mechanism that bridges a PC?s device firmware with its operating       system, the UEFI is an OS in its own right. It?s located in an       SPI-connected flash storage chip soldered onto the computer       motherboard, making it difficult to inspect or patch.              ...              While researchers have found Secure Boot vulnerabilities in the past,       there has been no indication that threat actors have ever been able to       bypass the protection in the 12 years it has been in existence. Until       now.              ...                     --- OpenXP 5.0.57        * Origin: (2:221/1.58)       SEEN-BY: 1/123 10/0 1 15/0 90/1 92/1 102/401 103/1 705 105/81 106/201       SEEN-BY: 123/131 129/305 153/7715 154/10 203/0 214/22 218/0 1 215       SEEN-BY: 218/700 720 810 820 840 850 860 880 900 221/1 6 360 226/30       SEEN-BY: 227/114 229/111 112 113 206 307 317 400 424 426 428 452 470       SEEN-BY: 229/550 664 700 240/1120 266/512 280/464 5003 282/1038 292/854       SEEN-BY: 301/1 113 317/3 320/219 322/757 342/200 396/45 423/81 460/58       SEEN-BY: 633/280 712/848       PATH: 221/1 301/1 218/700 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca