Christiaan Beek, a security researcher at Rapid7, has developed the first known proof-of-concept ransomware that infects a computer's CPU by altering its microcode. This hardware-level ransomware bypasses all antivirus protections and persists even if hardware components such as the motherboard, RAM, or storage are replaced, or if the system is reformatted, as long as the infected CPU remains in use. The proof-of-concept was inspired by a recently discovered AMD Zen chip bug that allows unauthorized microcode to be loaded onto the processor. The attack leverages the UEFI firmware to install unsigned updates to the CPU, making detection and removal by conventional security tools ineffective. Beek has stated that the ransomware will not be released publicly. While there are no reports of CPU-level ransomware being used in the wild, experts note that such techniques could be exploited by advanced threat actors, including state-sponsored groups.
🔥 Cybercriminals are now using Microsoft’s own Quick Assist tool to deploy ransomware like Black Basta. And with Ransomware-as-a-Service, anyone can launch an attack. No BCDR? You’re gambling your business. Learn 5 must-have recovery moves now → https://t.co/TiKjV20jNu
North Korean IT Workers Are Being Exposed on a Massive Scale | Matt Burgess, WIRED Security researchers are publishing 1,000 email addresses they claim are linked to North Korean IT worker scams that infiltrated Western companies—along with photos of men allegedly involved in https://t.co/ipwWm1dSlJ
5 BCDR Essentials for Effective Ransomware Defense: https://t.co/1eHpUlP8uG by The Hacker News #infosec #cybersecurity #technology #news