Meteor

Malware updated 4 months ago (2024-05-04T21:17:40.220Z)
Download STIX
Preview STIX
Meteor is a type of malware that has been identified as causing significant disruptions to computer systems. This malicious software can infiltrate systems through various channels, including suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Notably, unlike other similar programs such as Stardust and Comet, Meteor does not override the boot process. Furthermore, all samples of this wiper malware, except for Meteor, contain multiple occurrences of the string “INDRA”. Intel's 14th Gen Meteor Lake-S Desktop CPUs have been designed to counteract the Meteor malware. These CPUs are expected to be featured in upcoming Dell XPS and Alienware laptops, including the Core Ultra 7 and Core Ultra 9 models. The company announced that these chips, which will support Intel's XeSS AI upscaling technology for games, are slated to launch at the end of 2023. Intel believes that these processors, which include dedicated AI processors, should be considered for the next processor upgrade. In addition to combating malware, these Meteor Lake chips are also anticipated to improve graphics performance significantly. Intel has detailed how it expects its Vision Processing Units (VPUs) to be utilized, with these processors coming standard on every Meteor Lake chip. Intel CEO Pat Gelsinger has emphasized the importance of these developments, comparing the advent of AI PCs to the significance of Centrino and Wi-Fi in the early 2000s. He stated that these new processors, designed to run AI applications locally, are due for release next month.
Description last updated: 2024-05-04T20:26:08.996Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Windows
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Meteor Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
8 months ago
MSI Claw A1M With Intel Core Ultra 7 Chip Unveiled at CES 2024: See Price
CERT-EU
9 months ago
Hackaday Podcast Episode 246: Bypassing Fingerprint Readers Is Easy, Killing Memory Chips Is Hard, Cell Phones Vs Sperm
CERT-EU
9 months ago
Reports says 73 percent of internet traffic is malicious bots | Digital Trends
CERT-EU
10 months ago
CPU owners are suing Intel. Here's the surprising reason why | Digital Trends
CERT-EU
10 months ago
Linux Kernel 6.6 is Here: Find Out What’s New
CERT-EU
10 months ago
Army to set up digital contracting center of excellence | Federal News Network
CERT-EU
a year ago
Space update: Satellites, Starlink and a fiery eclipse
CERT-EU
a year ago
PCs are interesting again, and it's thanks to A.I.
CERT-EU
a year ago
Hackaday Podcast 226: Ice, Snow, And Cooling Paint In July
CERT-EU
a year ago
Bigger not always better in AI, boutique models are coming
MITRE
2 years ago
Indra — Hackers Behind Recent Attacks on Iran - Check Point Research
CERT-EU
2 years ago
Les processeurs ARM vont-ils vraiment peser 25% du marché des PC portables en 2028 ?
CERT-EU
a year ago
Windows 12 : un premier aperçu de la configuration requise
CERT-EU
a year ago
2023 OpenText Cybersecurity Threat Report Reinforces Need for Multilayered Security Approach – Global Security Mag Online
CERT-EU
a year ago
Linux 6.3 est disponible. Cette version s'accompagne d'un support initial pour les processeurs Intel de 14e g�n�ration Meteor Lake et fait appel � plus de code Rust
CERT-EU
a year ago
Links 08/05/2023: Many More Intel and Microsoft Layoffs