LoJax
Affected product: Windows
Type: UEFI malware
Estimate date of origin: early 2017
Impact: As it is in Unified Extensible Firmware Interface (UEFI), it can survise complete reimage of the system.
Recommended actions:
- Reflash the compromised UEFI.
- Use Secure Boot, when Secure Boot is enabled, each and every firmware component that is loaded by the firmware needs to be properly signed, thus ensuring the integrity of the firmware.
- Use latest UEFI firmware.
- Use modern chipset with Platform Controller Hub (starting form Intel Series 5 chipset)
Threat Group: Sednit also known as APT28, Sofacy, Strontium and Fancy Bear
Noteworty: First UEFI rootkit found in the wild
References
First UEFI malware discovered in wild is laptop security software hijacked by Russians