VnutZ Domain
Copyright © 1996 - 2020 [Matthew Vea] - All Rights Reserved

2014-12-24
Featured Article

More Hardware Based Infection Vectors

[index] [656 page views]
Tagged As: Exploit, Hacking, and Security

A vulnerability analyst developed a proof of concept for infecting OS X computers with a persistent rootkit simply by plugging in a Thunderbolt device. A customized Thunderbolt device can send unsigned firmware updates into the host machine that are accepted into the host's Option ROM. Upon reboot, the rootkit begins execution before the OS even loads, allowing it to perform whatever nefarious functions it wants via hooks and patches on the loaded code before security software ever has a chance to see it. The technique is more dastardly version of existing techniques - exfiltrating/infiltrating data via FireWire DMA or the Dirty USB presented at 2014's BlackHat.



More site content that might interest you:

As if the Internet wasn't already untrustworthy, it's becoming too easy to fabricate everything.


Try your hand at fate and use the site's continuously updating statistical analysis of the MegaMillions and PowerBall lotteries to choose "smarter" number. Remember, you don't have to win the jackpot to win money from the lottery!


Tired of social media sites mining all your data? Try a private, auto-deleting message bulletin board.