{"id":184514,"date":"2015-02-17T13:59:55","date_gmt":"2015-02-17T18:59:55","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-burying-spyware-within-firmware-of-disk-drives-made-by-seagate-western-digital-and-other-major-manufacturers.php"},"modified":"2015-02-17T13:59:55","modified_gmt":"2015-02-17T18:59:55","slug":"nsa-burying-spyware-within-firmware-of-disk-drives-made-by-seagate-western-digital-and-other-major-manufacturers","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-burying-spyware-within-firmware-of-disk-drives-made-by-seagate-western-digital-and-other-major-manufacturers.php","title":{"rendered":"NSA burying spyware within firmware of disk drives made by Seagate, Western Digital and other major manufacturers"},"content":{"rendered":"<p><p>    The US National Security Agency (NSA) has been hiding spyware    within the firmware of hard-disk drives made by Seagate,    Samsung, Toshiba, and Western Digital - and other major    manufacturers - in a spy programme that has been running for    almost 20 years, according to security software company    Kaspersky.  <\/p>\n<p>    Kaspersky claims to have found the spyware lurking in the    firmware of PC hard-disk drives in as many as 30 countries    worldwide, with Iran the most affected country. PCs in Russia,    Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria    were also affected. The targets included government and    military institutions, telecoms companies, banks, energy    companies, nuclear researchers, media, and Islamic activists.  <\/p>\n<p>    Kaspersky claims that the attacks - which it has dubbed \"the    Equation group\" - may date back to as long ago as 1996 - but    were certainly being conducted from 2001. \"The Equation group uses multiple malware    platforms, some of which surpass the well-known 'Regin' threat    in complexity and sophistication. The Equation group is    probably one of the most sophisticated cyber attack groups in    the world; and they are the most advanced threat actor we have    seen,\" claims the report from Kaspersky.  <\/p>\n<p>    It continues: \"In general, the Equation group uses a specific    implementation of the RC5 encryption algorithm throughout their    malware. Some of the most recent modules use RC6, RC4 and    Advanced Encryption Standard (AES) too, in addition to other    cryptographic functions and hashes.  <\/p>\n<p>    \"One technique in particular caught our attention and reminded    us of another complex malware, Gauss. The GrayFish loader uses    SHA-256 one thousand times over the unique NTFS object ID of    the victim's Windows folder to decrypt the next stage from the    registry. This uniquely ties the infection to the specific    machine, and means the payload cannot be decrypted without    knowing the NTFS object ID,\" explains the report.  <\/p>\n<p>    The company claims to have identified several malware platforms    within the Equation group. These include:  <\/p>\n<p>    A victim doesn't immediately get infected with EquationDrug,    claims Kaspersky. First, the attackers infect them with    DoubleFantasy, which is a validator-style plug-in. If the    victim is confirmed as interesting to the attackers, the    EquationDrug installer is delivered.  <\/p>\n<p>    \"GrayFish is the most modern and sophisticated malware implant    from the Equation group. It is designed to provide an effective    (almost \"invisible\") persistence mechanism, hidden storage and    malicious command execution inside the Windows operating    system,\" claims Kaspersky.  <\/p>\n<p>    It continues: \"By all indications, GrayFish was developed    between 2008 and 2013 and is compatible with all modern    versions of Microsoft's operating systems, including Windows NT    4.0, Windows 2000, Windows XP, Windows Vista, Windows 7 and 8 -    both 32-bit and 64-bit versions.  <\/p>\n<p>    \"To store stolen information, as well as its own auxiliary    information, GrayFish implements its own encrypted Virtual File    System (VFS) inside the Windows registry. To bypass modern OS    security mechanisms that block the execution of untrusted code    in kernel mode, GrayFish exploits several legitimate drivers,    including one from the CloneCD program. This driver    (ElbyCDIO.sys) contains a vulnerability which GrayFish exploits    to achieve kernel-level code execution. Despite the fact that    the vulnerability was discovered in 2009, the digital signature    has not yet been revoked,\" claims the report.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.computing.co.uk\/c\/554\/f\/538923\/s\/437a1e7f\/sc\/46\/l\/0L0Scomputing0O0Cctg0Cnews0C23956750Cnsa0Eburying0Espyware0Ewithin0Efirmware0Eon0Edisk0Edrives0Emade0Eby0Eseagate0Ewestern0Edigital0Eand0Eother0Emajor0Emanufacturers\/story01.htm\/RK=0\/RS=sxeCvk5OEbXAv7cHqk9Zack7jYw-\" title=\"NSA burying spyware within firmware of disk drives made by Seagate, Western Digital and other major manufacturers\">NSA burying spyware within firmware of disk drives made by Seagate, Western Digital and other major manufacturers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The US National Security Agency (NSA) has been hiding spyware within the firmware of hard-disk drives made by Seagate, Samsung, Toshiba, and Western Digital - and other major manufacturers - in a spy programme that has been running for almost 20 years, according to security software company Kaspersky. Kaspersky claims to have found the spyware lurking in the firmware of PC hard-disk drives in as many as 30 countries worldwide, with Iran the most affected country. PCs in Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria were also affected.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-burying-spyware-within-firmware-of-disk-drives-made-by-seagate-western-digital-and-other-major-manufacturers.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-184514","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/184514"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=184514"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/184514\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=184514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=184514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=184514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}