Hacker successfully installs malware on your computer in less than 5 minutes
Mickey Shkatov, one of the researchers of Eclypsium Security, demonstrated the process of breaking into the laptop by opening the bottom of the machine, directly connecting the device to the chip containing the BIOS and then proceeding to install the malware. harm only in very short time, less than five minutes.
Shkatov said, even in some cases, hackers can conduct such attacks on computers without opening the device.
John Loucaides, Eclypsium's vice president of engineering, said it was difficult to take precautions, even with no measures to deal with such physical attacks.
Watch the video posted by Eclypsium below to see how easy it is for Mickey Shkatov to do the above process!
Shkatov said that before the attack he used a backdoor (free on GitHub) or a rootkit to program a dedicated device ($ 285) to flash the computer's software or BIOS. So, in the video on Shkatov, just attach a laptop to the chip and the tool will run automatically according to the pre-programmed command.
According to Shkatov, with an experienced hacker, although he doesn't know what the target laptop is, they only need 10 to 20 minutes to find the right backdoor and deploy it after connecting the device to the laptop.
See more:
- US military secrets were sold by hackers on Dark Web
- It's time to change the definition of hackers
- Microsoft has a group of "elite" Hacker who specialize in attacking Windows to keep this operating system safe
- The way Hacker uses to remain anonymous
You should read it
- XLoader malware attacks Mac users, collects login information, takes screenshots
- Prepare the total force to respond to DDoS attacks in 2014
- A new kind of malware is spreading through Messenger and Skype spam messages
- Hacker was jailed for 2 years for DDoS attacks against Skype and Google
- 5 signs of computer infection with malware
- Prevent malware from breaking into the BIOS
- Instructions for installing Mickey Mouse and Minnie Mouse AR Emoji on Galaxy S9
- Modular Malware - New stealth attack method to steal data
- What is malware analysis? How are the steps taken?
- Answer these 5 questions before clicking on any link
- Hacker attacks Chrome utility to install malware
- Vietnam Hacker forum was paralyzed