Meteor

Malware updated 23 days ago (2024-11-29T14:02:11.997Z)
Download STIX
Preview STIX
Meteor is a type of malware that has been identified as causing significant disruptions to computer systems. This malicious software can infiltrate systems through various channels, including suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Notably, unlike other similar programs such as Stardust and Comet, Meteor does not override the boot process. Furthermore, all samples of this wiper malware, except for Meteor, contain multiple occurrences of the string “INDRA”. Intel's 14th Gen Meteor Lake-S Desktop CPUs have been designed to counteract the Meteor malware. These CPUs are expected to be featured in upcoming Dell XPS and Alienware laptops, including the Core Ultra 7 and Core Ultra 9 models. The company announced that these chips, which will support Intel's XeSS AI upscaling technology for games, are slated to launch at the end of 2023. Intel believes that these processors, which include dedicated AI processors, should be considered for the next processor upgrade. In addition to combating malware, these Meteor Lake chips are also anticipated to improve graphics performance significantly. Intel has detailed how it expects its Vision Processing Units (VPUs) to be utilized, with these processors coming standard on every Meteor Lake chip. Intel CEO Pat Gelsinger has emphasized the importance of these developments, comparing the advent of AI PCs to the significance of Centrino and Wi-Fi in the early 2000s. He stated that these new processors, designed to run AI applications locally, are due for release next month.
Description last updated: 2024-05-04T20:26:08.996Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Windows
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Meteor Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
MITRE
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago