Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Russian hackers use malware that can survive a system reinstall

Russian hackers use malware that can survive a system reinstall

According to ESET, Russian hackers use malware that can survive on a Windows computer even after a complete reinstallation of the system.

The company discovered malware called "Lojax" that comes from a hacker group known as "Fancy Bear". Malware crawls security shields (such as antivirus software) by mimicking the behavior of the LoJack tool. This tool protects your computer from theft, which means that it is definitely difficult to remove from your computer.

Since this software is intended to protect the system from thieves, it is important that it be resistant to removal when reinstalling the system or replacing the hard drive. That is why it is implemented in the UEFI / BIOS chip itself

- states ESET.

Fancy Bears "armed" LoJack and created malware that can go through protection in the computer. ESET states that many manufacturers of computer security tools let LoJack work because it is designed to protect against theft and requires all possible system permissions.

When Lojax infects a UEFI module, it can remain there after replacing the HDD. The only way to remove it is to flash UEFI firmware, which many users do not know how to do.

ESET said Lojax was the first UEFI Rootkit to be seen in real use. So far, security experts have only talked about possible UEFI Rootkits, although no one has ever used them.

Russian hackers use malware that can survive a system reinstall

The company did not want to reveal the owner of the computer on which they discovered the malware. However, they warned that the Fancy Bear group used various components of Lojax to infect the systems of government organizations in the Balkans and some other Central and Eastern European countries.

However, the good news for all users is that the computer can be protected from Lojax by simply turning on the "Secure Boot" option. This option verifies that all computer components, including firmware, are authentic with a digital certificate issued by the manufacturer. Lojax just doesn’t pass this test. The Secure Boot option is enabled by default for Windows 10 systems, and if someone does not, it can be manually enabled in the BIOS options.

Comments

Popular this month

How to download the complete FB profile

UPDATE: The article has been updated. Click here. You have probably heard these days that the hacker group "Anonymous" will crash Facebook on November 5, 2011, maybe it will, maybe it won't. If you want to save all your pictures and videos, etc. you can do it in a few steps.

Five wishes from Google

Google is under investigation for allegedly abusing its strong position as a leader in the field of Internet search, and competing companies are suing Google and their partners, as this giant company is increasingly expanding into markets where it is already competitive.

This premium VPN gives free 17+ GB of bandwidth per month!

As you surf the internet your location is available on every site you visit. Basically, every site you visit knows your IP address, location, region, country . .. and much more. You don't believe it? Just look at this link and you will see your details: https://www.find-ip.net/ip-script If you don't already use a VPN, you can see your IP address, country, city, and region in the box above. Worrying?

Speccy - Get to know your computer in detail

The average user usually only knows what the CPU speed is, how much RAM it has, what the label is on the graphics card, and how much the HDD is… But he doesn't know some perhaps more important details. Speccy is a program that will reveal these details and you will have a complete insight into all the components that are inside your machine.

Look at historical objects in three dimensions

Google has launched a new Cultural Institute service where you can view some 3-dimensional historical objects on your computer in your favorite web browser. The items are detailed and you can enlarge them to see even the smallest parts. Of course, they are not perfect, there are some irregularities somewhere, but they were not noticed.