[coreboot] and here we go again!

Zoran Stojsavljevic zoran.stojsavljevic at gmail.com
Fri Jun 9 05:52:39 CEST 2017

[image: Inline image 1]


On Thu, Jun 8, 2017 at 10:59 PM, ron minnich <rminnich at gmail.com> wrote:

> "Microsoft's security team has come across a malware family that uses
> Intel's Active Management Technology (AMT) Serial-over-LAN (SOL) interface
> <https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/>
>  as a file transfer tool. The problem with Intel AMT SOL is that it's
> part of Intel's ME, a separate chip inside Intel CPUs that runs its own OS
> and stays on even when the main CPU is off."
> This is getting monotonous. All these AMT exploits, ...
> ron
> --
> coreboot mailing list: coreboot at coreboot.org
> https://mail.coreboot.org/mailman/listinfo/coreboot
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.coreboot.org/pipermail/coreboot/attachments/20170609/8bed3529/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image.png
Type: image/png
Size: 268560 bytes
Desc: not available
URL: <http://mail.coreboot.org/pipermail/coreboot/attachments/20170609/8bed3529/attachment-0001.png>

More information about the coreboot mailing list