Kaspersky researchers have spotted a rare kind of potentially dangerous malware that targets a machine’s booting process to drop persistent malware. The campaign involved the use of a compromised UEFI (or Unified Extensible Firmware Interface) containing a malicious implant, making it the second known public case where a UEFI rootkit has been used in the wild. The malware framework “MosaicRegressor” is a custom version of the Hacking Team’s VectorEDK bootkit, which was leaked in 2015.
Source: https://thehackernews.com/2020/10/uefi-bootkit-malware.html

