I have long followed Rob Braxman of @RobBraxmanTech on Odysee. I find he is able to explain complex security issues so that I can understand them - or at least think I do. In his latest video he explains that the Intel IME system can be used to turn systems on, install or reinstall operating systems, and undertake every action possible to computers with Intel chipsets. While this capability was claimed to be to enable companies to manage their IT systems remotely, exploits that have been publicly available since 2017 continue to enable malicious actors to perform these operations on all computers with Intel chipsets, including brand new computers. This vulnerability has not been patched.
IMG source - Odysee.com/@RobBraxmanTech
I urge folks to understand this threat, and consider how to secure their cryptocurrency and financial assets from attack. Further, even if, like me, you don't access your accounts online at all, and therefore are not vulnerable to financial attacks via this vector, there are a great many means of profiting from identity theft that don't involve taking money from you directly. Therefore you should still implement security from this exploit as you are able.
Braxman states that Intel has disabled IME in 9th generation chips for consumer machines, and we are currently several generations beyond that today, so theoretically new Intel machines are immune to the IME exploit. However, an exploit remain in place on all Intel chipsets that load during boot 'even if the BIOS is locked down with a password.' He provides a link to a tool that Intel has provided that enables you to ascertain if your system is vulnerable to this exploit. While Intel is not offering a patch for this exploit at this time, knowing you are vulnerable enables you to take other actions, such as changing passwords, account numbers, and etc., that may have been previously compromised, and thereafter to keep such information secure from exploit.
Risk exists. Successful investing requires we manage risk, and that requires we do due diligence in ascertaining risks. I encourage you to do your due diligence. Rob points out that even if you find you are vulnerable there are things you can do to mitigate the threat. NAT (network address translation) that is ubiquitous on routers should prevent malicious actors from reaching your computer using IPV4, but IPV6 remains vulnerable, and he recommends disabling IPV6. By doing this you limit your vulnerability your local network. However, Wifi, Bluetooth, and such mechanisms yet can enable local attacks, so further attention is necessary to secure your system. Something else he recommends is not using public Wifi access, because this can enable bad actors to use the exploit to elevate their privileges on your system.
Finally, AMD systems are not vulnerable to these exploits, which are exclusive to Intel chipsets, but do remain vulnerable to the Meltdown and Spectre exploits. No matter what chipset your device runs, there are vulnerabilities that exist, and your ability to secure yourself from exploits depends on your exercise of due diligence to understand those vulnerabilities and take necessary actions to prevent bad actors from using them against you.
I hope you take necessary action to secure your system, your money, and yourself from bad people that want to do you harm.