Malware Buried Deep Down the SPI Flash: Sednit's First UEFI Rootkit Found in the Wild
BIOS rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real campaigns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. This APT group, also known as Fancy Bear, Sofacy and APT28, has been linked to numerous high profile cyberattacks such as the 2016 Democratic National Committee email leak scandal.
By Jean-Ian Boutin & Frederic Vachon
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-18/briefings/schedule/index.html#malware-buried-deep-down-the-spi-flash-sednits-first-uefi-rootkit-found-in-the-wild-12543
Видео Malware Buried Deep Down the SPI Flash: Sednit's First UEFI Rootkit Found in the Wild канала Black Hat
By Jean-Ian Boutin & Frederic Vachon
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-18/briefings/schedule/index.html#malware-buried-deep-down-the-spi-flash-sednits-first-uefi-rootkit-found-in-the-wild-12543
Видео Malware Buried Deep Down the SPI Flash: Sednit's First UEFI Rootkit Found in the Wild канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Chaos: The Science of the Butterfly EffectInvestigating Malware Using Memory Forensics - A Practical ApproachBIOS and UEFI As Fast As PossibleHow Risky is Updating Your BIOS? ( + Corruption Demonstration)Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]Horse Pill: A New Type of Linux RootkitBehind the scenes of iOS and Mac SecuritySamy Kamkar's Crash Course in How to Be a Hardware HackerThe UEFI Firmware Rootkits: Myths and RealityHow to know if your PC is hacked? Digital Forensics 101Kai Jern Lau, Nguyen Anh Quynh – qiling.io: Advanced Binary Emulation frameworkThe 6 "No's" You Should Know When It Comes to Law EnforcementUEFI Ransomware | Malware infects BIOSAttacking Hypervisors Using Firmware And HardwareBest Malware Analysis Tools | Learn Malware AnalysisHow To Detect Rootkits On Kali Linux - chkrootkit & rkhunterFlat Earthers vs Scientists: Can We Trust Science? | Middle GroundExploiting Network PrintersHow to Remove ANY Virus from Windows 10 in ONE STEP in 2021