Intel Chipset Firmware Actively Targeted by Conti Group

  /     /     /  
Publicated : 23/11/2024   Category : security


Intel Chipset Firmware Actively Targeted by Conti Group


Conti threat actors are betting chipset firmware is updated less frequently than other software — and winning big, analysts say.



Leaked communications from within the Conti threat group reveal the Moscow-backed cybercrime group has honed its firmware attack skills and is actively targeting Intel Management Engine (ME), a microcontroller inside many iterations of the modern Intel chipset, according to a new report.
The analysis, from Eclypsium, notes that Intel chipsets arent being
targeted by Conti
because they have vulnerable code, but rather the group assumes firmware patching is spotty at best. In addition, firmware attacks can evade most security tools, the analysts added.
This can leave some of the most powerful and privileged code on a device susceptible to attack, the report detailing the
Conti firmware attacks
said. The recent
Conti leaks
mark a critical phase in the rapidly evolving role of firmware in modern attacks.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Intel Chipset Firmware Actively Targeted by Conti Group