#Chinese APT deploys MoonBounce implant in UEFI #firmwarehttps://t.co/DLN9wfVjHE#APT #apt41 #100DaysOfCode #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #Security #infosec #OpenSource #Python #javascript #tech #DataSecurity #Malware #hacker #privacy #CISO
— ?????? ????????????? (@bamitav) January 22, 2022
? MoonBounce, a custom UEFI firmware implant used in targeted attacks, has been linked to ?? hacking group APT41, aka Winnti or Double Dragon.
— Byron Wan (@Byron_Wan) January 22, 2022
1/n https://t.co/GpR3XZ1dCG
Chinese APT Deploys MoonBounce Implant In UEFI Firmware https://t.co/YoREX24eNG
— Nicolas Krassas (@Dinosn) January 21, 2022
Kaspersky (Russian) researchers were able to attribute, with a high level of confidence, MoonBounce being used as part of a wider cyber-espionage campaign to APT41, a known Chinese-speaking advanced persistent threat (APT) group. https://t.co/X3iTz2P8Kt @DarkReading
— 780th Military Intelligence Brigade (Cyber) (@780thC) January 21, 2022
Researchers Discover Dangerous Firmware-Level Rootkit https://t.co/8iqIu3Vrhw
— Nicolas Krassas (@Dinosn) January 21, 2022
MoonBounce UEFI implant used by spy group brings firmware security into spotlight https://t.co/3NOikegtiD #DataPrivacy #DataProtection #CyberSecurity #CIO #CISO #CPO #security #news #technology #hack #datesecurity #infosec #gdpr #dataprotection
— Ralph Browning ➡️ The Privacy Guy (@DataShadow) January 22, 2022
New UEFI malware implants malicious code into the motherboard's Serial Peripheral Interface (SPI) Flash https://t.co/4DbATTuYtx
— Oleksiy Gayda ?? (@0x4f47) January 22, 2022
Chinese Hackers Spotted Using New UEFI Firmware Implant in Targeted Attackshttps://t.co/ro3lKM844F#Cybersecurity #Innovation #Fintech #Startups #AI #ML #DigitalTransformation
— silvino 欢迎 (@_silvino_) January 21, 2022
Chinese Hackers Spotted Using New UEFI Firmware Implant in Targeted Attacks https://t.co/eIrgJvwu2j #news #cybersecurity #infosec pic.twitter.com/YK32LWKutS
— DeepFriedCyber (@DeepFriedCyber) January 21, 2022
One again: Zero days since the last persistent UEFI malware. Remember, it's the spec, not the implementation.https://t.co/37JBeuBqGF
— Stefan Reinauer (@StefanReinauer) January 22, 2022
Chinese APT41 hackers spotted using a previously undocumented "MoonBounce" firmware implant to maintain stealthy persistence during targeted cyber espionage campaigns.
— Sheeraz Ali (@beingsheerazali) January 21, 2022
Read details: https://t.co/h2Q0RyIHHY#infosec #cybersecurity #hacking #malware @TheHackersNews
Chinese Hackers Spotted Using New UEFI Firmware Implant in Targeted Attacks https://t.co/EJJ5p4CUNQ #security #opensource #cybersecurity #malware #cyber #pentesting #redteam #malwarehunting #infosec #hacking #infosec #threathunting #bugbounty #tools #malwareanalysis #offensiv…
— Filipi Pires (@FilipiPires) January 21, 2022
Firmware based attacks show up in the arsenal of APT41 reported by @SecurityCharlie at @ZDNet. H/t to @Byron_Wan. The malware is connected to the China based group because it used the same C2 infrastructure.#cybersecurity #China https://t.co/Qn9EOWd7CY
— Robert Potter (@rpotter_9) January 22, 2022
#MoonBounce Malware Hides In Your #BIOS Chip, Persists After Drive Formats https://t.co/zfpkDIB3La#apt41 #100DaysOfCode #firmware #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #Security #infosec #OpenSource #Python #javascript #DataSecurity #Malware #CISO #RT
— ?????? ????????????? (@bamitav) January 22, 2022
#Chinese #Hackers Spotted Using New UEFI #firmware Implant in Targeted Attacks
— ?????? ????????????? (@bamitav) January 22, 2022
https://t.co/78HoxVNlsC#apt41 #APT28 #100DaysOfCode #code #CodeNewbie #Developers #bugbounty #CyberAttack #cybersecurity #Security #infosec #OpenSource #Python #javascript #tech #DataSecurity #CISO