• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Linux security Mac security Windows security

MoonBounce Bootkit targets UEFI hard drives making it irreplaceable

William Marshal Posted On January 22, 2022
0



MoonBounce Bootkit

Security researchers from Kaspersky have discovered a novel bootkit that can infect UEFI firmware in a computer. This malware is found to be a novel one, can be troublesome if compromises your network devices.

What is MonoBounce bootkit?

MoonBounce is a novel bootkit malware that affects the SPI flaws memory that is found on the motherboard. It doesn’t reside the hard drive named ESP where the UEFI code typically resides. As per Kaspersky research, the defenders can’t reinstall the operating system to replace the hard drive as this MoonBounce bootkit will continue to exist in the Infective drive until the SPI memory or the motherboard is fixed.

MoonBounce is the third  UEFI bootkit that has been discovered so far which can infect and reside within the SPI memory joining its predecessors MosaicRegressor and LoJox.

Also, the discovery of MoonBounce bootkit comes after other bootkit discoveries in recent months, including ESPectre, FinSpy’s UEFI bootkit and few others, which proves the release of UEFI standard was challenging for hackers before but not anymore.

The MoonBounce bootkit and Chinese APT41 connection

Kaspersky researchers mentioned that the MoonBounce bootkit will allow hackers to keep their access on infected devices and further deploy additional payloads for other motives. A Transportation Service company have had the strains of MoonBounce bootkit on their network and had deployed other payloads on to the company’s devices. Researchers had studied those payloads and have narrowed down China’s APT41 group to be the ones behind MoonBounce bootkit.

MoonBounce Bootkit
Source: Securelist

This connection with the cyber-espionage group APT41 was confirmed when both MoonBounce bootkit and other payloads were communicating with the same server infrastructure. Since the other payloads have been linked to APT41, the MoonBounce  bootkit also must be theirs.

The mere question for the researchers  is how MoonBounce bootkit was deployed into the devices in first place.

How to stay vigilant against MoonBounce bootkit?

Kaspersky researchers have asked users to update their UEFI firmware periodically to verify their BootGuard is in place and enabled. Also, Trust Platform Modules should be enabled for the respected hardware to ensure security  against MoonBounce.


Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends




Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search