Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Russian hackers use malware that can survive a system reinstall

Russian hackers use malware that can survive a system reinstall

According to ESET, Russian hackers use malware that can survive on a Windows computer even after a complete reinstallation of the system.

The company discovered malware called "Lojax" that comes from a hacker group known as "Fancy Bear". Malware crawls security shields (such as antivirus software) by mimicking the behavior of the LoJack tool. This tool protects your computer from theft, which means that it is definitely difficult to remove from your computer.

Since this software is intended to protect the system from thieves, it is important that it be resistant to removal when reinstalling the system or replacing the hard drive. That is why it is implemented in the UEFI / BIOS chip itself

- states ESET.

Fancy Bears "armed" LoJack and created malware that can go through protection in the computer. ESET states that many manufacturers of computer security tools let LoJack work because it is designed to protect against theft and requires all possible system permissions.

When Lojax infects a UEFI module, it can remain there after replacing the HDD. The only way to remove it is to flash UEFI firmware, which many users do not know how to do.

ESET said Lojax was the first UEFI Rootkit to be seen in real use. So far, security experts have only talked about possible UEFI Rootkits, although no one has ever used them.

Russian hackers use malware that can survive a system reinstall

The company did not want to reveal the owner of the computer on which they discovered the malware. However, they warned that the Fancy Bear group used various components of Lojax to infect the systems of government organizations in the Balkans and some other Central and Eastern European countries.

However, the good news for all users is that the computer can be protected from Lojax by simply turning on the "Secure Boot" option. This option verifies that all computer components, including firmware, are authentic with a digital certificate issued by the manufacturer. Lojax just doesn’t pass this test. The Secure Boot option is enabled by default for Windows 10 systems, and if someone does not, it can be manually enabled in the BIOS options.

Comments

Popular this month

New Google mobile internet saving application - Datally

I wrote an article on how to save internet traffic on an Android device and I suggested the Onavo Extend and Opera Max apps because they were the most popular back then. Meanwhile, Opera Max has been discontinued and Onavo has been completely redesigned and is now a VPN application with the option to save internet traffic. Their compression technology is probably now used by Facebook in its application because they bought Onavo - link . Google has decided to seize the opportunity and "push" with a new application called " Datally ".

SOPA and PIPA are slowly losing support, the protest yielded results

Controversial U.S. anti-piracy laws, known by the acronyms SOPA and PIPA lost the support of eight members of Congress after major protests by the Internet community. Support was denied, among others, by Marco Rubio of Florida, a rising star of the Republican Party, and his party colleague Roy Blunt of Missouri - who were among the signatories of the bills.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Twitter is celebrating its sixth birthday

Exactly six years ago, one of the founders of Twitter posted his first tweet - " just setting up my twttr ". Although the popularity of this service was modest in the first few years, today Twitter has over 500 million users who send tweets, and messages 140 characters long.

Google AI game recognizes and learns what you draw!

Artificial intelligence (AI) is quite popular nowadays and is being used more and more intensively. Google has, I can say, the most developed so far and is available to end-users (at least one part). We had a chance to see how it is integrated into the new Google Assistant that has replaced Google Now.