Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Russian hackers use malware that can survive a system reinstall

Russian hackers use malware that can survive a system reinstall

According to ESET, Russian hackers use malware that can survive on a Windows computer even after a complete reinstallation of the system.

The company discovered malware called "Lojax" that comes from a hacker group known as "Fancy Bear". Malware crawls security shields (such as antivirus software) by mimicking the behavior of the LoJack tool. This tool protects your computer from theft, which means that it is definitely difficult to remove from your computer.

Since this software is intended to protect the system from thieves, it is important that it be resistant to removal when reinstalling the system or replacing the hard drive. That is why it is implemented in the UEFI / BIOS chip itself

- states ESET.

Fancy Bears "armed" LoJack and created malware that can go through protection in the computer. ESET states that many manufacturers of computer security tools let LoJack work because it is designed to protect against theft and requires all possible system permissions.

When Lojax infects a UEFI module, it can remain there after replacing the HDD. The only way to remove it is to flash UEFI firmware, which many users do not know how to do.

ESET said Lojax was the first UEFI Rootkit to be seen in real use. So far, security experts have only talked about possible UEFI Rootkits, although no one has ever used them.

Russian hackers use malware that can survive a system reinstall

The company did not want to reveal the owner of the computer on which they discovered the malware. However, they warned that the Fancy Bear group used various components of Lojax to infect the systems of government organizations in the Balkans and some other Central and Eastern European countries.

However, the good news for all users is that the computer can be protected from Lojax by simply turning on the "Secure Boot" option. This option verifies that all computer components, including firmware, are authentic with a digital certificate issued by the manufacturer. Lojax just doesn’t pass this test. The Secure Boot option is enabled by default for Windows 10 systems, and if someone does not, it can be manually enabled in the BIOS options.

Comments

Popular this month

Facebook is introducing another new service

Facebook is preparing another novelty for us. This is the  " Listen With Friends " application that will soon appear on chats , and with it, you will be able to listen to music with the person you are corresponding with.

Interesting gadgets for less than $5 [2. part]

Due to the great interest in the article in which I presented several interesting gadgets that cost less than $ 5 , I decided to compile another list. Note :  all the products I listed below can be purchased on various sites, but I posted links to Aliexpress because I have bought a lot there and have the most experience.

Android TV Box - a guide to buying up to 30 euros

What is Android TV Box? This is a great solution if you want to add a " Smart " function to an existing TV . With this device, you can watch live TV online for free (later on), play games, upload all kinds of files, watch movies (from USB, over the internet, phone…), listen to songs, surf the internet, use social networks… or everything you can on your Android phone. It is usually a cube-shaped device (but it doesn't have to be) and has various inputs and outputs. It connects to the TV via an HDMI cable , but some also have an AV output over 3.5mm that goes to the familiar 3 cinches, so you can also connect to an older TV (even to SCART if you have an adapter). It is also standard for these devices to have WiFi , LAN port (RJ45), IR Remote , at least 2 USB ports , support for high definition video formats (these cheap ones often have 4K support), and usually come with a remote .

Android ROOT - programs and applications

I have already written several posts on how to root an Android device, so I decided to make one in which I will unite everything.

Serbia will soon have the strongest supercomputer in the Balkans!

By upgrading the "Paradox" supercomputer, Serbia will receive in the next few months the most powerful supercomputer in the Balkans, worth around one million euros! Today, the " Paradox " supercomputer has 1,100 processors and operates at seven teraflops, which is 7,000 billion operations per second. With the upgrade, the computer will have 5,000 processors and will work at 40 teraflops, or 40,000 billion operations per second. It can currently store 60 terabytes (60,000 gigabytes) of data.