Found in the wild: The world’s first unkillable UEFI bootkit for Linux (arstechnica.com)
from VITecNet@programming.dev to linux@lemmy.ml on 27 Nov 23:26
https://programming.dev/post/22210028

#linux

threaded - newest

metaStatic@kbin.earth on 28 Nov 00:49 next collapse

found in the wild
no evidence of actual infections in the wild

you know I shouldn't be disappointed by blatant lies in headlines with the state of journalism in current year but I still kinda am.

PowerCrazy@lemmy.ml on 28 Nov 02:35 next collapse

You are disappointed because it doesn’t have to be this way.

vort3@lemmy.ml on 28 Nov 03:00 next collapse

Thanks for saving my time.

pastermil@sh.itjust.works on 28 Nov 05:57 next collapse

I’m disappointed, but this is a good thing.

MTK@lemmy.world on 28 Nov 06:09 collapse

You can find it in the wild without finding evidence of infection.

I think in this context found in the wild means that the sample was found in the wild, just maybe not running.

progandy@feddit.org on 28 Nov 06:19 next collapse

So, they are talking about a bootkit embedding itself into the uefi firmware, then the graphics show a malicious bootloader that resides in the EFI partition that can be removed by formatting.

Jumuta@sh.itjust.works on 28 Nov 14:28 collapse

imagine using uefi or bios at all

coreboot+grub2 superiority