shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

290
active users

#blacklotus

0 posts0 participants0 posts today

Tomorrow, I start as Director of Product Marketing at Eclypsium, Inc. I am excited to work alongside an extremely smart and thoughtful team.

Increasingly, attackers are targeting firmware to evade OS-level protections and maintain persistence. It's an "out of sight, out of mind" attack vector, but extremely critical. Watch this space because it could get real messy, real fast. Think of what an APT can do with with root access to enterprise network appliances, or what malware syndicates could do with an easy-to-use boot kit.

What controls do you currently have in place to assess and mitigate the risk of firmware attacks, especially those delivered through your supply chain? Eclypsium makes this easy for IT and security teams. Delivered as SaaS, the platform helps you to establish trust in your software, firmware, and hardware supply chain. Eclypsium has the largest library of firmware profiles and can verify the observed firmware matches the firmware profile that should be on the device, as well as report on firmware configurations.

This blog post from @paulasadoorian chronicles recent real-world firmware attacks and explains why attackers focus on firmware: eclypsium.com/blog/endpoint-fi

#Microsoft does it again on #PatchTuesday with a flawless victory against the forces of...bootable media?

That includes any emergency boot disks, recovery partitions created by the OEM that makes your computer, recovery partitions you made prior to today, bootable media from third parties including emergency recovery tools.

On the one hand, the CVE-2023-24932 bug seems really bad. UEFI malware that inserts itself at a lower level than Secure Boot? It's incredibly dangerous. [Edit: changed "but" to "bug"]

On the other hand, it's also extremely rare and unlikely to affect most users. Meanwhile, the thing that does affect many Windows users are crashes that cause the computer not to be able to boot.

And now, the #KB5025885 patch removes the one safety net under the high wire. Now you get to go wild and free and maybe...your computer falls to its death.

Ai yi yi, I am normally the guy who tells you to apply these important patches right away, and this has me questioning that advice.

If you decide that you need to do this, you probably need to find another method of creating a bootable backup of your system drive, just in case something goes wrong. I use a NVMe drive and have an external backup device that lets me clone from my main drive to a second NVMe drive, but that's a highly specialized set of tools and it's not cheap or easy.

This whole situation seems like something that could have been handled a lot better by our friends in the MSRC.

#CVE202324932 #24932 #UEFI #SecureBoot #BlackLotus #patch #Windowsupdate

support.microsoft.com/en-us/to

Researchers on Wednesday announced a major #cybersecurity find—the world’s first-known instance of real-world #malware that can hijack a computer’s boot process even when #Secure #Boot and other advanced protections are enabled and running on fully updated versions of #Windows.
Dubbed #BlackLotus, the malware is what’s known as a UEFI bootkit. These sophisticated pieces of malware target the #UEFI—short for Unified Extensible Firmware Interface—the low-level and complex chain of firmware responsible for booting up virtually every modern computer.
As the mechanism that bridges a PC’s device firmware with its operating system, the UEFI is an OS in its own right.
It’s located in an SPI-connected #flash storage chip soldered onto the computer motherboard, making it difficult to inspect or patch.
Previously discovered bootkits such as #CosmicStrand, #MosaicRegressor, and #MoonBounce work by targeting the UEFI firmware stored in the flash storage chip. Others, including BlackLotus, target the software stored in the EFI system partition.
While researchers have found Secure Boot vulnerabilities in the past, there has been no indication that threat actors have ever been able to bypass the protection in the 12 years it has been in existence.
Until now.

arstechnica.com/information-te

Ars TechnicaStealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flawBlackLotus represents a major milestone in the continuing evolution of UEFI bootkits.