Intel Chipset Firmware Actively Targeted by Conti Group

  /     /     /  
Publicated : 23/11/2024   Category : security


Intel Chipset Firmware Actively Targeted by Conti Group


Conti threat actors are betting chipset firmware is updated less frequently than other software — and winning big, analysts say.



Leaked communications from within the Conti threat group reveal the Moscow-backed cybercrime group has honed its firmware attack skills and is actively targeting Intel Management Engine (ME), a microcontroller inside many iterations of the modern Intel chipset, according to a new report.
The analysis, from Eclypsium, notes that Intel chipsets arent being
targeted by Conti
because they have vulnerable code, but rather the group assumes firmware patching is spotty at best. In addition, firmware attacks can evade most security tools, the analysts added.
This can leave some of the most powerful and privileged code on a device susceptible to attack, the report detailing the
Conti firmware attacks
said. The recent
Conti leaks
mark a critical phase in the rapidly evolving role of firmware in modern attacks.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Intel Chipset Firmware Actively Targeted by Conti Group