home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   WINDOWS      Bill Gates farts and we can ALL smell it      3,071 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 3,013 of 3,071   
   August Abolins to All   
   Unpatchable UEFI bootkit bypasses Secure   
   06 Mar 23 13:36:00   
   
   MSGID: 2:221/1.58@fidonet 062a08e2   
   PID: OpenXP/5.0.57 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0500   
      
   >==================================================================<   
    ** Original area               : "/grc/securitynow"   
    ** Original message from       : PHolder+NNTP@gmail.com (Paul Holder)   
    ** Original message to         :   
    ** Original date/time          : 06 Mar 23, 12:48   
   >==================================================================<   
      
   https://arstechnica.com/information-technology/2023/03/unkillabl   
   -uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/   
      
   Researchers on Wednesday announced a major cybersecurity find?the   
   world?s first-known instance of real-world malware that can hijack a   
   computer?s boot process even when Secure Boot and other advanced   
   protections are enabled and running on fully updated versions of   
   Windows.   
      
   Dubbed BlackLotus, the malware is what?s known as a UEFI bootkit. These   
   sophisticated pieces of malware infect the UEFI?short for Unified   
   Extensible Firmware Interface?the low-level and complex chain of   
   firmware responsible for booting up virtually every modern computer. As   
   the mechanism that bridges a PC?s device firmware with its operating   
   system, the UEFI is an OS in its own right. It?s located in an   
   SPI-connected flash storage chip soldered onto the computer   
   motherboard, making it difficult to inspect or patch.   
      
   ...   
      
   While researchers have found Secure Boot vulnerabilities in the past,   
   there has been no indication that threat actors have ever been able to   
   bypass the protection in the 12 years it has been in existence. Until   
   now.   
      
   ...   
      
      
   --- OpenXP 5.0.57   
    * Origin:  (2:221/1.58)   
   SEEN-BY: 1/123 10/0 1 15/0 90/1 92/1 102/401 103/1 705 105/81 106/201   
   SEEN-BY: 123/131 129/305 153/7715 154/10 203/0 214/22 218/0 1 215   
   SEEN-BY: 218/700 720 810 820 840 850 860 880 900 221/1 6 360 226/30   
   SEEN-BY: 227/114 229/111 112 113 206 307 317 400 424 426 428 452 470   
   SEEN-BY: 229/550 664 700 240/1120 266/512 280/464 5003 282/1038 292/854   
   SEEN-BY: 301/1 113 317/3 320/219 322/757 342/200 396/45 423/81 460/58   
   SEEN-BY: 633/280 712/848   
   PATH: 221/1 301/1 218/700 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca