Intel chipsets
For the last five years, Intel chipsets have a hole through which cybercriminals can easily bypass security and easily install malicious code – keylogger. A severe problem is not being able to patch the gap. The error is encoded in ROM, where the boot data is downloaded. It occurs at the hardware level; it cannot be removed. Unfortunately, this can lead to an imperceptible attack and infect millions of devices. However, there is good news; the attacker’s capabilities are minimal, even if he must have access to a computer or a local network. Additional security is the cryptographic key inside the programmable OTP memory. However, the encryption key is still vulnerable. The situation is dangerous, espionage is particularly sensitive. The problem is that the ROM allows you to take control before you secure the hardware with a cryptographic key, but that the error is irreparable seems only a matter of time to get that key. The error is in Intel chipsets sold for five years. The latest ten chipsets have improved. The company admits that it is impossible to repair the hole programmatically. A few days ago, a patch was released that solves the problem, but what counts is the time during which all potential attacks must be quarantined.