Fri, 12 Jan 2018 22:06:00 +0100 

Intel AMT Security Issue Lets Attackers Bypass Login Credentials in Corporate Laptops
Insecure defaults in Intel AMT allow an intruder to completely bypass user and BIOS passwords and TPM and Bitlocker PINs to backdoor almost any corporate laptop in a matter of seconds.

Helsinki, Finland – January 12, 2018: F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists within Intel’s Active Management Technology (AMT) and potentially affects millions of laptops globally.
Marshall Sutherland
 Sat, 13 Jan 2018 00:38:38 +0100 
I just tried this on my company laptop. I had no luck in my first two attempts, but on my 3rd attempts, I find myself with the spinny thing and a message "Please wait for the gpsvc". This seems to be a Windows 10 message, so I'm thinking it is unrelated to this exploit.

It has been spinning here for many minutes, so I think it is time for a hard power off...
Marshall Sutherland
 Sat, 13 Jan 2018 00:43:14 +0100 
It booted back up, so that is a good thing, :-)