It's unclear if there's a hidden partition in that last link. It could
be an infected UEFI bios, or something else entirely.
> If it is loaded into memory before the OS loads, it has access
> to everything (network and files). Even any Linux/Apple partitions or
> cloud storage you might have. It's a sophisticated rootkit.
>
> The payload can be anything. Just plain political spying to
> stealing banking/administrative passwords or even ransom.
Yes, I know about advanced rootkits and state-sponsored malware. It is
way more than ransomware needs to do it's job. The spook stuff is well
targeted, usually by 0-day exploits on USB sticks which the targets
are encouraged to plug in their air-gapped systems. It's something
that needs to stay hidden, not "all ur files are belong to us!"
screamed out from an uncloseable pop-up window. Not saying it's
impossible, just unlikely in this scenario as users don't put their
stuff in hidden partitions. It's beyond the capabilities of the
average malware author and not worth the effort anyway.
> Weird, the original Kaspersky report has been removed from
>
archive.org. I get a "Bummer, that page cannot be found"
Oo-er!