<p><br>
> | All these revelations seem to be from about 2007. Who knows what they<br>
> | are up to now.<br>
><br>
> Reading more...<br>
><br>
> Some are as recent as 2009.</p>
<p>Correct, had planned to mention that yesterday after reading your previous mail.<br>
><br>
> SWAP provides "software application persistence" by exploiting the<br>
> BIOS and the HDD's Host Protected Area. Works with Windows, Linux,<br>
> FreeBSD, or Solaris (as of 2007).<br>
><br>
> Cottonmouth (I, II, and III) are USB plugs that contain network<br>
> exfiltration capability.<br>
><br>
> Ragemaster is a little thing that you put in a VGA cable that captures<br>
> the red signal and makes it available for exfiltration via a RADAR<br>
> unit.</p>
<p>Another odd thing about these attacks is they seem mostly aimed at corporate products. Don't seem to make sense, as terrorist activity are unlikely to happen in office networks. Weird.</p>
<p>Apple products are missing in the list. Looks like this has to do with dumping BIOS for EFI earlier. I think EFI is more bloated so may already be compromised in updated list .</p>
<p>The only good news is it seem the vendors are not working with them. This mean they pick a victim, send someone to break into the premise discretely and plant the bug. Or is there anyway on can infect BIOS of a running system? Or what is their delivery method in your opinion?</p>
<p>Regards </p>
<p>William</p>