{"id":193751,"date":"2015-03-20T18:07:21","date_gmt":"2015-03-20T22:07:21","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/hacking-bios-chips-isnt-just-the-nsas-domain-anymore.php"},"modified":"2015-03-20T18:07:21","modified_gmt":"2015-03-20T22:07:21","slug":"hacking-bios-chips-isnt-just-the-nsas-domain-anymore","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/hacking-bios-chips-isnt-just-the-nsas-domain-anymore.php","title":{"rendered":"Hacking BIOS Chips Isnt Just the NSAs Domain Anymore"},"content":{"rendered":"<p><p>    The ability to hack the BIOS chip at the heart of every    computer is no longer reserved for the NSA and other    three-letter agencies. Millions of machines contain    basic BIOS vulnerabilities that letanyone with moderately    sophisticated hacking skills compromise and control a system    surreptitiously, according to two researchers.  <\/p>\n<p>    The revelation comes two years after a catalogue of NSA    spy tools leaked to journalists in Germany surprised    everyone with its talk about the NSAs efforts to infect BIOS    firmware with malicious implants.  <\/p>\n<p>    The BIOS boots a computer and helps load the operating system.    By infecting this core software, which operates below antivirus    and other security products and therefore is not usually    scanned by them, spies can plant malware that remains live and    undetected even if the computers operating system were wiped    and re-installed.  <\/p>\n<p>    BIOS-hacking until now has been largely the domain of advanced    hackers like those of the NSA. But researchers Xeno Kovah and    Corey Kallenberg presented a proof-of-concept attack today at    the CanSecWest conference in Vancouver, showing how they could    remotely infect the BIOS of multiple systems using a host of    new vulnerabilities that took them just hours to uncover. They    also found a way to gain high-level system privileges for their    BIOS malware to undermine the security of    specializedoperating systems like Tailsused by    journalists and activists for stealth communications and    handling sensitive data.  <\/p>\n<p>    Although most BIOS have protections to prevent unauthorized    modifications, the researchers were able to bypass these to    reflash the BIOS and implant their malicious code.  <\/p>\n<p>    Kovah and Kallenberg recently left MITRE, a government    contractor that conducts research for the Defense Department    and other federal agencies, to launch LegbaCore, a firmware    security consultancy. They note that the recent discovery of    a firmware-hacking toolby Kaspersky Lab researchers    makes it clear that firmware hacking like their BIOS demo is    something the security community should be focusing on.  <\/p>\n<p>    Because many BIOS share some of the same code, they were able    to uncover vulnerabilities in 80 percent of the PCs they    examined, including ones from Dell, Lenovo and HP. The    vulnerabilities, which theyre calling incursion    vulnerabilities, were so easy to find that they wrote a script    to automate the process and eventuallystopped counting    the vulns it uncovered because there were too many.  <\/p>\n<p>    Theres one type of vulnerability, which theres literally    dozens of instances of it in every given BIOS, says Kovah.    They disclosed the vulnerabilities to the vendors and patches    are in the works but have not yet been released. Kovah says,    however, that even when vendors have produced BIOS patches in    the past, few peoplehave applied them.  <\/p>\n<p>    Because people havent been patching their BIOSes, all of the    vulnerabilities that have been disclosed over the last couple    of years are all open and available to an attacker, he notes.    We spent the last couple of years at MITRE running around to    companies trying to get them to do patches. They think BIOS is    out of sight out of mind [because] they dont hear a lot about    it being attacked in the wild.  <\/p>\n<p>    An attacker could compromise the BIOS in two waysthrough    remote exploitation by delivering the attack code via a    phishing email or some other method, or through physical    interdiction of a system. In that case, the researchers found    that if they had physical access to a system they could infect    the BIOS on some machines in just two minutes. This highlights    just how quickly and easy it would be, for example, for a    government agent or law enforcement officer with a moments    access to a system to compromise it.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/44a09639\/sc\/15\/l\/0L0Swired0N0C20A150C0A30Cresearchers0Euncover0Eway0Ehack0Ebios0Eundermine0Esecure0Eoperating0Esystems0C\/story01.htm\/RK=0\/RS=_AZsoN1AjBBWGSnCEkzBUq83Dlo-\" title=\"Hacking BIOS Chips Isnt Just the NSAs Domain Anymore\">Hacking BIOS Chips Isnt Just the NSAs Domain Anymore<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The ability to hack the BIOS chip at the heart of every computer is no longer reserved for the NSA and other three-letter agencies. Millions of machines contain basic BIOS vulnerabilities that letanyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to two researchers.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/hacking-bios-chips-isnt-just-the-nsas-domain-anymore.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-193751","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193751"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=193751"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193751\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=193751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=193751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=193751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}