article thumbnail

MoonBounce: the dark side of UEFI firmware

SecureList

At the end of 2021, we were made aware of a UEFI firmware-level compromise through logs from our Firmware Scanner , which has been integrated into Kaspersky products since the beginning of 2019. This one is made up of implants found in the UEFI firmware within the SPI flash, a non-volatile storage external to the hard drive.

Firmware 145
article thumbnail

BotenaGo botnet targets millions of IoT devices using 33 exploits

Security Affairs

Ax with firmware 1.04b12 and earlier CVE-2016-1555 Netgear WN604 before 3.3.3 CVE-2017-6077 NETGEAR DGN2200 devices with firmware through 10.0.0.50 Beta, D6220, D6400, D7000 CVE-2018-10561, CVE-2018-10562 GPON home routers CVE-2013-3307 Linksys X3000 1.0.03 CVE-2017-6077 NETGEAR DGN2200 devices with firmware through 10.0.0.50

IoT 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hundreds of thousands of routers exposed to Eternal Silence campaign via UPnP?

Security Affairs

In early 2013, researchers at Rapid7 published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” that evaluated the global exposure of UPnP-enabled network devices. Experts recommend users installing routers update and patched firmware to mitigate the threat.

article thumbnail

APT trends report Q1 2022

SecureList

In December we were made aware of a UEFI firmware-level compromise through logs from our firmware scanning technology. Further analysis showed that the attackers modified a single component within the firmware to append a payload to one of its sections and incorporate inline hooks within particular functions.

Malware 135
article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

For instance, in late 2013 and January 2014, we observed higher-than-normal activity in Ukraine by the Turla APT group, as well as a spike in the number of BlackEnergy APT sightings. It directly affected satellite modems firmwares , but was still to be understood as of mid-March.

DDOS 136
article thumbnail

Growing Cyber Threats to the Energy and Industrial Sectors

NopSec

SCADA Access As A Service (SAaaS) Cybercrime is a business. Between 2013 and 2014, a Russia-backed group alternatively known as Dragonfly and Energetic Bear launched targeted attacks against energy sector companies by targeting suppliers and service providers used by these companies. One is called SCADA Access as a Service, or SAaaS.