This type of malicious elements that can attack our PC are among the most feared in the world of technology. Precisely for all this, most users take a series of precautions such as installing antivirus and other security solutions.
Keep in mind that some of these take control of the computer, others steal sensitive data, or some simply damage the operating system. In this particular case we are going to talk about Moonbounce, a virus that can resist formatting of drives and Windows reinstallations. We are talking in these lines about a new malware that has spread in recent days. Named as Moonbounce, it is a malware that can survive formatting of drives, for example.
Keep in mind that it is not a Trojan or a normal virus that affects Windows. In this case we find a complex bootkit that targets the firmware of the motherboard itself or UEFI. Therefore, this allows it to survive changes made to disk drives or to the operating system itself. We must know that the aforementioned motherboard has its own storage chip, the flash memory. This contains the software needed to boot up and communicate with the rest of the PC’s hardware.
How to delete Moonbounce virus from PC
In fact, one of the leading security companies, Kaspersky, claims that this Moonbounce malware was created by a hacker group called APT41. This group in the past was involved in cybercrime campaigns around the world. The bootkit was first spotted in spring 2021 and is more advanced than the previous two of its kind.
To give you an idea of what we are talking about, Moonbounce targets the CORE_DXE in the BIOS of the PC’s motherboard. Thus, it is executed when its boot sequence is started and the malware intercepts certain functions to implant itself in the operating system. After that, it communicates with a remote control server and deliver a malicious payload to neutralize system security.
Attackers can use Moonbounce to spy on users, archive files, collect network information, etc. To all this, we must add that the main antiviruses cannot track the infection on the disk. This means that it runs in memory without relying on files on the drives.
And it is that this type of malicious code is difficult to eliminate, but not impossible. One of the main reasons is that antiviruses are ineffective outside of the operating system. Therefore, one of the measures to get rid of this malware is enable secure boot bios. We can also add a password to this component which blocks unauthorized firmware updates.
In the event that we have not enabled secure boot or set the password before the potential attack, we can always flash UEFI to get rid of the annoying malware.