Source |
The Hacker News |
Identifiant |
4008833 |
Date de publication |
2022-01-21 03:40:40 (vue: 2022-01-21 12:06:00) |
Titre |
Chinese Hackers Spotted Using New UEFI Firmware Implant in Targeted Attacks |
Texte |
A previously undocumented firmware implant deployed to maintain stealthy persistence as part of a targeted espionage campaign has been linked to the Chinese-speaking Winnti advanced persistent threat group (APT41).
Kaspersky, which codenamed the rootkit MoonBounce, characterized the malware as the "most advanced UEFI firmware implant discovered in the wild to date," adding "the purpose of the |
Notes |
|
Envoyé |
Oui |
Condensat |
adding advanced advanced uefi firmware apt41 attacks been campaign chinese codenamed date deployed discovered espionage firmware group hackers has implant kaspersky linked maintain malware most new part persistence persistent previously purpose rootkit moonbounce speaking spotted stealthy targeted threat uefi undocumented using which wild winnti characterized the |
Tags |
Malware
Threat
Guideline
|
Stories |
APT 41
APT 41
|
Move |
|