this post was submitted on 09 Aug 2024
184 points (85.9% liked)

Technology

59135 readers
3561 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] mox@lemmy.sdf.org 25 points 2 months ago* (last edited 2 months ago)

Notable quote:

“It's going to be nearly undetectable and nearly unpatchable.” Only opening a computer's case, physically connecting directly to a certain portion of its memory chips with a hardware-based programming tool known as SPI Flash programmer and meticulously scouring the memory would allow the malware to be removed, Okupski says.

Let's hope a microcode or BIOS update can prevent it from happening in the first place.

Original source:

https://info.defcon.org/event/?id=54863

Relevant links:

https://ioactive.com/event/def-con-talk-amd-sinkclose-universal-ring-2-privilege-escalation/

https://www.youtube.com/watch?v=xSp38lFQeRE

https://www.youtube.com/watch?v=lR0nh-TdpVg&t=2s

https://www.bleepingcomputer.com/news/security/new-amd-sinkclose-flaw-helps-install-nearly-undetectable-malware/

(I found the Bleeping Computer article more informative and concise than the Wired one.)