mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-24 05:02:10 +00:00
1.6 KiB
1.6 KiB
title | date | replyURI | replyTitle | replyType | replyAuthor | replyAuthorURI |
---|---|---|---|---|---|---|
Intel ME rootkits | 2022-10-19T13:20:19-07:00 | https://mastodon.social/@byterhymer/109181969125151465 | Don't forget there have already been Intel ME rootkits too | SocialMediaPosting | @byterhymer@mastodon.social | https://mastodon.social/@byterhymer |
I know of two Intel ME rootkits that didn't involve Intel AMT; the latter can be enabled/disabled on "vPro" chips. One rootkit was from 2009 and seems less relevant now; the more recent of the two was by {{}} and {{}} at Black Hat Europe 2017: {{}} (application/pdf).
Without AMT, they required physical access. Most PCs are woefully unprepared against the sorts of attacks enabled by physical access, and ME is only one entry in a long list of issues.