Sorry to tell you but there is an agressive UEFI Root/Bootkit running circles.
I don't know either it"s name nor the idiot whom wrote it.
Fact is: it patches UEFI from infected Pendrive , it unworks the following OSs --> BSD, Openindiana, Linux, Ms Windows.
something gets downloaded after booting the machine (level 2 loading)
My question is how can a UEFI be extracted from a CMOS to reverse this s* f* kit.
The Intruder may delete files, set permissions on folders and files, install other malware like patched NetworkFilterDriver, etc,...
In my case the Intruder(s) malform the human readable Strings in my self compiled Java bytecode jars.
UEFI update doesnt delete it.
Edited by hamluis, 06 July 2018 - 04:18 PM.
Moved from Internal Hardware to General Security - Hamluis.