New Intel firmware boot verification bypass enables low-level backdoors

Researchers have found a new way to defeat the boot verification process for some Intel-based systems, but the technique can also impact other platforms and can be used to compromise machines in a stealthy and persistent way.

Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel’s reference Unified Extensible Firmware Interface (UEFI) implementation at the Hack in the Box conference in Amsterdam this week.

To read this article in full, please click here

Read more: New Intel firmware boot verification bypass enables low-level backdoors

Story added 10. May 2019, content source with full text you can find at link above.