{"id":185201,"date":"2015-02-19T16:00:25","date_gmt":"2015-02-19T21:00:25","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/not-only-the-nsa-knows-how-to-make-unerasable-malware.php"},"modified":"2015-02-19T16:00:25","modified_gmt":"2015-02-19T21:00:25","slug":"not-only-the-nsa-knows-how-to-make-unerasable-malware","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/not-only-the-nsa-knows-how-to-make-unerasable-malware.php","title":{"rendered":"Not Only the NSA Knows How to Make Unerasable Malware"},"content":{"rendered":"<p><p>    Hacking tools that burrow inside hard disk drives could also be    made by nongovernment hackers.  <\/p>\n<p>    Over the weekend Russian security company Kaspersky described a    suite of extremely sophisticated hacking    tools that since 2008 have been used to infiltrate    government, military, and corporate computers in 30 countries    around the world. Reuters reports that it was the work of the U.S. National Security    Agency.  <\/p>\n<p>    Kasperskys most striking finding was that the toolkit of what    it calls the Equation Group could inject malware into the    software embedded inside hard disk drives. Not only is that    firmware invisible to conventional security software, but    malicious code hidden inside it can emerge to take over a    computer even after its hard disk has been carefully erased.    Costin Raiu, a researcher with Kaspersky, told the New York Times that the    technique rendered investigators like him practically blind.  <\/p>\n<p>    That impressive trick sets a new bar for the sophistication in    malware caught in the wild. And it has led to speculation that    the NSA had assistance from hard drive manufacturers, for    example by getting access to details on how their firmware    worked.  <\/p>\n<p>    But despite suggestions it would be just about impossible for even the NSA to    reverse-engineer hard drive firmware without such help, it    appears to be well within its reachand that of many others,    too. In recent years hackers and researchers with budgets far    smaller than the NSAs have reverse-engineered the firmware of    hard drives and other devices and demonstrated their own    invisible malware.  <\/p>\n<p>    That raises the prospect that multiple national intelligence    agenciesand perhaps even groups without government    backingcould be using the technique. Few, if any, security    researchers are on the lookout for such attacks because they    are essentially invisible.  <\/p>\n<p>    Anyone looking to get started hacking hard drive firmware would    be well advised to start with this page on the subject from prolific hacker Jereom    Domburg. In 2013 he gave several talks on his research and    showed how it enabled him to remotely take over a server with a hard    disk made by Western Digital, a leading manufacturer whose    drives were also targeted by Equation Group.  <\/p>\n<p>    Also in 2013, academic researchers independently went even    further and developed several proof-of-concept attacks    against a hard disk from a different manufacturer. They showed    how a disks firmware could be infected remotely, and made a    system to communicate over the Internet with the unerasable    malware to send commands and copy data such as encryption keys.    This line from the academic papers summary has gained new    plausibility after what we learned over the weekend:  <\/p>\n<p>    The difficulty of implementing such an attack is not limited    to the area of government cyber-warfare; rather, it is well    within the reach of moderately funded criminals, botnet herders    and academic researchers.  <\/p>\n<p>    At the Black Hat security conference last summer, two    researchers described how they had reverse engineered the firmware of USB sticks to    hide code inside that can silently take over a computer.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.technologyreview.com\/view\/535226\/not-only-the-nsa-knows-how-to-make-unerasable-malware\" title=\"Not Only the NSA Knows How to Make Unerasable Malware\">Not Only the NSA Knows How to Make Unerasable Malware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Hacking tools that burrow inside hard disk drives could also be made by nongovernment hackers. Over the weekend Russian security company Kaspersky described a suite of extremely sophisticated hacking tools that since 2008 have been used to infiltrate government, military, and corporate computers in 30 countries around the world <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/not-only-the-nsa-knows-how-to-make-unerasable-malware.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-185201","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/185201"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=185201"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/185201\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=185201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=185201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=185201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}