From the reading I did on this yesterday -- the exploit requires the introduction of a Windows exploit to an existing system to compromise the firmware of the harddrive.
It was pointed out that the exploit might be altered to work on OS X or LINUX but for now these operating systems are not a target of this exploit. Social engineering by email is the entry point and the payload is a windows .exe file ...
If I were to guess what will be next the payload will be wrapped in a mobile app -- that would have the next widest coverage ...
|