Eset comparing tdl4 with new bootkit from China is absolutely incorrect
secondary - it's x86
third - new China bootkit intercepts ExVerifySuite function and replaces legitimate fips.sys with very primitive rootkit driver used for dll injection.
both tdl4/fips using bootkit techiniques/driver replacements so
the same words but totaly different meaning.
There are other ways of penetrating into kernel-mode address space on x64 operating systems, for instance, as in the case of the Chinese bootkit which is detected as NSIS/TrojanClicker.Agent.BJ (VirusTotal). This uses quite a different approach to load its unsigned driver.first of all this bootkit is nothing special (it had zero stealth level)
secondary - it's x86
third - new China bootkit intercepts ExVerifySuite function and replaces legitimate fips.sys with very primitive rootkit driver used for dll injection.
both tdl4/fips using bootkit techiniques/driver replacements so
the same words but totaly different meaning.