All of you knew that it could only get worse:
Kaspersky malware probers have uncovered a new 'operating system-like' platform that [they claim] was developed and used by the National Security Agency (NSA) in its Equation spying arsenal. The EquationDrug or Equestre platform is used to deploy [an estimated] 116 plug-in modules to target computers that can siphon data and spy on victims. So far, only 30 modules have been identified.
"It's important to note that EquationDrug is not just a trojan, but a full espionage platform, which includes a framework for conducting cyber-espionage activities by deploying specific modules on the machines of selected victims," Kaspersky researchers say in a report.
The article goes on to explain that Kaspersky further believes that the software is part of the "NSA's campaign to infect hard disk firmware". There is considerably more detail in the article.
I think I am going to get my old manual typewriter out of the garage, get a new ribbon, use U.S. Mail instead of e-mail, and buy more ink for my fountain pens.
(Score: 2) by wantkitteh on Tuesday March 17 2015, @05:22AM
If you consider how a piece of malware like this would actual infect a system, it's pretty obvious that the OS is booted and the encryption key has been entered prior to the HDD firmware being subverted. The malware that annexes this storage area will have to deal with adaptations to the file system to maintain system integrity. Given the level of sophistication in play here, I don't think it's too much to expect full-drive encryption techniques to be subjected to the same kind of integrity preservation techniques - there's a good chance this all would have been discovered earlier if infected systems with encrypted drives started falling over and dying for no reason.