Link Search Menu Expand Document

LoJax


Affected product: Windows

Type: UEFI malware

Estimate date of origin: early 2017

Impact: As it is in Unified Extensible Firmware Interface (UEFI), it can survise complete reimage of the system.

Recommended actions:

  • Reflash the compromised UEFI.
  • Use Secure Boot, when Secure Boot is enabled, each and every firmware component that is loaded by the firmware needs to be properly signed, thus ensuring the integrity of the firmware.
  • Use latest UEFI firmware.
  • Use modern chipset with Platform Controller Hub (starting form Intel Series 5 chipset)

Threat Group: Sednit also known as APT28, Sofacy, Strontium and Fancy Bear

Noteworty: First UEFI rootkit found in the wild


References

LoJax

First UEFI malware discovered in wild is laptop security software hijacked by Russians