The company ESET, based in Slovakia, has announced finding the first-ever UEFI rootkit in the wild. Once infected with the malware the only option is to reflash the SPI firmware or else replace the whole motherboard.
First spotted in early 2017, LoJax is a trojaned version of a popular legitimate LoJack laptop anti-theft software from Absolute Software, which installs its agent into the system's BIOS to survive OS re-installation or drive replacement and notifies device owner of its location in case the laptop gets stolen.
According to researchers, the hackers slightly modified the LoJack software to gain its ability to overwrite UEFI module and changed the background process that communicates with Absolute Software's server to report to Fancy Bear's C&C servers.
UEFI is an overly complex replacement for BIOS, and is often conflated with one of its payloads, Restricted Boot aka Secure Boot.
(Score: 2, Interesting) by TheFool on Saturday September 29 2018, @12:13PM
Nefarious side-goals aside, this is the reason that they give on paper for secure boot. BIOS security was non-existent, so the OS had to do it - and to get to that point, you had to get pretty far into the boot process. In UEFI, everyone calls a firmware provided "please check the signature" function on the files (and it's files now, not reading blocks from disk and jumping to them) as you read them in. Much easier for the underpaid, oversees devs to maintain and understand.
The real shame is that they didn't make key management required if you support secure boot. That would have solved the whole Linux problem, and personally I think it would be cool to sign my own grub while deleting M$'s keys entirely.