For only the second time, security researches found UEFI malware in the wild

(Image credit: ASRock)

Security researchers at Kaspersky have discovered a rootkit in the wild that infects UEFI (Unified Extensible Firmware Interface) firmware, which is basically the modern day BIOS. This is only the second time they have observed malicious UEFI firmware in use by a threat actor in the wild. In this case, by way of targeted attacks against non-government organizations (NGOs) in Africa, Asia, and Europe.

Rootkits are also highly resilient to traditional detection and removal methods. By infecting the UEFI, malware can load while the PC is being initialized, before the operating system and any antivirus software has a chance to step in and thwart any malicious activity. But that is only part of the problem. Because rootkits reside in the BIOS/UEFI, a PC remains infected even if going nuclear and reinstalling the OS, or swapping out the storage drive entirely.

Kaspersky has named this particular rootkit strain MosaicRegressor. It was discovered during an investigation of several suspicious UEFI firmware images. Kaspersky found that several components of the rootkit were based on leaked source code of HackingTeam's VectorEDK bootkit, with some minor modifications and modules added into the mix.

"The goal of these added modules is to invoke a chain of events that would result in writing a malicious executable named ‘IntelUpdate.exe’ to the victim’s Startup folder. Thus, when Windows is started the written malware would be invoked as well. Apart from that, the modules would ensure that if the malware file is removed from the disk, it will be rewritten," Kaspersky says.

Kaspersky is not entirely sure how exactly MosaicRegressor found its way into the wild. One possibility is by an attacker having physical access to a target PC, and installing it from a USB flash drive.

Your next upgrade

(Image credit: Future)

Best CPU for gaming: the top chips from Intel and AMD
Best graphics card: your perfect pixel-pusher awaits
Best SSD for gaming: get into the game ahead of the rest

"Such a USB would contain a special update utility that can be generated with a designated builder provided by the company. We found a Q-flash update utility in our inspected firmware, which could have been used for such a purpose as well," Kaspersky says.

While that would be the most straightforward way, Kaspersky has not ruled out the possibility of a remote attack, "perhaps through a compromised update mechanism." There is no evidence to suggest this actually occurred, but it is a possibility nonetheless.

While the typical user probably does not need to worry about MosaicRegressor, it is still a bit concerning that it exists, especially if it does come to light that it spread through remote means. This could embolden attackers to focus on similar attacks. In theory, anyway. In practice, malware actors are, for the most part, likely to stick with tried and trued methods, such as ransomware.

Thanks, Bleeping Computer

Paul Lilly

Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).

Latest in Hardware
A Gigabyte RTX 5070 Ti Eagle OC Ice on a desk and installed in a gaming PC.
Gigabyte GeForce RTX 5070 Ti Eagle OC Ice SFF review
A late afternoon view shows two young women walking past a wall-sized anime mural along Chuo-dori (Central Avenue) in the Akihabara district (known as Electric Town for its maze of electronics stores, but currently considered an almost sacred destination by members of Japan's otaku culture, drawn to Akihabara's video game centers, maid cafes, anime shops, and manga comics), located in Chiyoda Ward in central Tokyo, Japan.
OpenAI's GPT-4o model gets image generation update for all of your anime-style selfie needs
A Nacon Rig Streamstar M2 microphone on white gravel, shot in 3/4 profile
Nacon Rig M2 Streamstar review
1X Technologies humanoid robot, the Neo Gamma, standing alongside Nvidia CEO Jensen Huang. Huang is wearing an ERL-made studded leather jacket.
Humanoid robot Neo Gamma gifts Nvidia CEO a studded leather jacket and may even be able to one day wash up a cup without dropping it
Razer Blade 16 (2025) gaming laptop
Nvidia RTX 5090 mobile tested: The needle hasn't moved on performance but this is the first time I'd consider ditching my desktop for a gaming laptop
A woman wearing a VR headset with dramatic, colourful lighting across the background
'World’s smallest LEDs' could lead to accurately lit screens with 127,000 pixels per inch and much more immersive VR
Latest in News
A screenshot from SaGa Frontier 2, showing one of the protagonists wandering through a quaint fantasy village
One of Square Enix' most underrated PlayStation-era JRPGs just shadow dropped on Steam
The titular character from Princess Mononoke is depicted riding the wolf goddess Moro and carrying a spear.
Studio Ghibli AI image trend floods social media, cheered on by OpenAI and denounced by critics as an insult to Hayao Miyazaki
Marvel Rivals tier list - Wolverine
Marvel Rivals director says a future patch will reduce the shooter's insatiable hunger for RAM: 'It's a very big problem'
Hogwarts Legacy potions professor holding a potion
An unannounced Hogwarts Legacy expansion and 'definitive edition' have reportedly been cancelled
Story of Seasons - A cahacter in a purple tuxedo stands outside in a town square talking to the player
Story of Seasons is doing another Harvest Moon remake and it might be the best the series has ever looked
Assassin's Creed Shadows change seasons - An upper-body shot of Yasuke looking cheerfully up into the distance.
Assassin's Creed Shadows puts up the 'second highest day-one sales revenue in Assassin's Creed franchise history'