Security researchers at FireEye / Mandiant [say] "We identified the presence of a financially-motivated threat group that we track as FIN1, whose activity at the organisation dated back several years."
[...] "FIN1 used this malware to access the victim environment and steal cardholder data. The group, which may be located in Russia, is known for stealing data that is easily monetised from financial services organisations such as banks, credit unions, ATM operations, and financial transaction processing and financial business services companies."
[...] The malware's installation location also means it will persist even after re-installing the operating system, widely considered the most effective way to eradicate malware.
Can we all agree that updating firmware should require the movement of a physical jumper?
(Score: 2) by VanessaE on Wednesday December 09 2015, @04:26PM
How do you get the updated BIOS image onto that stick without risking the file itself being compromised (e.g. some virus modifies the file at some point between downloading it and flashing it out)?
(Score: 2) by jmorris on Wednesday December 09 2015, @05:04PM
That is a pretty solved problem. RSA signatures are a commonplace solution.