MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
rootkit
Search

Eight months after discovery, unkillable LoJax rootkit campaign remains active

Wednesday January 16, 2019. 03:00 PM , from Ars Technica
Enlarge (credit: Lino Mirgeler/picture alliance via Getty Images)
Last May, researchers published a bombshell report documenting sophisticated malware attributed to the Russian government. The malware, dubbed 'LoJax,' creates a persistent backdoor that survives operating system reinstalls and hard drive replacements. On Wednesday, researchers published new findings that indicate the campaign remains active.
LoJax in May became the first known case of a real-world attack harnessing the power of the Unified Extensible Firmware Interface boot system found in virtually all modern Windows computers. As software that bridges a PC’s firmware and its operating system, UEFI is essentially a lightweight operating system in its own right. That makes it a handy place to hide rootkits because once there a rootkit will remain in place even after an OS is reinstalled or a hard drive is replaced.
LoJack repurposed
LoJax gets its name from LoJack, an anti-theft product from developer Absolute Software. The rootkit is a modified version of a 2008 release of LoJack (then called Computrace). The anti-theft software achieved persistence by burrowing into the UEFI of the computer it was protecting. The design ensured that even if a thief made major changes to a computer’s hardware or software, a LoJack “small agent” would remain intact and be able to contact Absolute Software servers.
Read 9 remaining paragraphs | Comments
https://arstechnica.com/?p=1441853
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Tue 16 - 15:13 CEST