Enjoyed new malware report? Want similar UEFI firmware implant for your operations? Check out my Boot Backdoor: it is more reliable than #CosmicStrand, it is harder to detect, it has more deployment options and its sources available on github: github.com/Cr4sh/s6_pcie_…
TFW your hobby stuff is more advanced and well made than state sponsored APT campaigns malware 😎
My Boot Backdoor is not state of the art UEFI implant in any mean, but it certainly defines bare minimum of reliability for such kind of malware. If something is unable to reach this bare minimum -- it doesn't looks like usable tool
• • •
Missing some Tweet in this thread? You can try to
force a refresh
So, what's wrong with #CosmicStrand UEFI implant from the first glance on its sample? What exactly lessons APT malware developers can learn from open source projects? 🧵⬇️
First, it is really trivial to detect this malware presence by patched nt!KiFilterFiberContext() function in order to disable PatchGuard. My UEFI rootkit is not interfering with PatchGuard at all, it also not using any permanent in-memory patches or callbacks, only temporary ones
Second, while #CosmicStrand is using pretty much standard set of hooks to hijack execution flow of the bootloader and kernel, like OslArchTransferToKernel() and so on, there's a lack of Hyper-V/HVCI presence checks in its boot stage code which is really bad ...
It's not a joke, by the way. I have IDA 7.6 or something relatively recent to use plugins wrote by other people, but my main battle version is an early 6. something. On my typical test cases it did not evolved much in disassembly quality, so why bother with updates
If you going to tell me something about AArch64 support -- I'm going to tell you that IA-64 support is still unusable without custom post-processing scripts and QDSP support is still missing at all 🤓
Is there any good recommendations for unofficial Apple service centers who can do complicated board-level repair of latest intel machines and accepts foreign customers? Exact country and budget doesn’t matter
This T2 chip with hardware encrypted soldered down SSD is buried few of my research projects (usually I’m not bothering to backup or preserve this crap) so I’m looking the ways to get my data back
I can spend week or two for rewriting this lost crap from the scratch but I rather want to pay the money for getting my Intel based laptop work again because now Apple is selling only useless ARM based garbage
I have a new weird obsession: DAT recorders! So, here's a really long thread about this outstanding piece of obsolete tech ⬇️⬇️⬇️
DAT was introduced by Sony in 1987 as recording and playback medium for digital audio. It adopted 16-bit PCM format with 44.1, 48 or 32 kHz of sampling rate. It's like an audio CD but stored on the magnetic tape. DAT cassette is about half size of the compact cassette
Commercially available DAT cassettes was able store up to 180 minutes of stereo signal recorded with 48 kHz sample rate. Also, exactly the same cassettes was used for DDS-1 streamers to store 2 GB uncompressed or 4 GB compressed data on standard cartridge