{"id":58370,"date":"2015-02-22T21:48:16","date_gmt":"2015-02-23T02:48:16","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-the-nsas-firmware-hacking-works-and-why-its-so-unsettling\/"},"modified":"2015-02-22T21:48:16","modified_gmt":"2015-02-23T02:48:16","slug":"how-the-nsas-firmware-hacking-works-and-why-its-so-unsettling","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-the-nsas-firmware-hacking-works-and-why-its-so-unsettling\/","title":{"rendered":"How the NSAs Firmware Hacking Works and Why Its So Unsettling"},"content":{"rendered":"<p><p>One of the most shocking parts of  the   recently discovered spying network Equation Group is its  mysterious module designed to reprogram or reflash a computer  hard drives firmware with malicious code. The Kaspersky  researchers who uncovered this said its ability to subvert hard  drive firmwarethe guts of any computersurpasses anything else  they had ever seen.  <\/p>\n<p>    The hacking tool, believed to be a    product of the NSA, is significant because subverting the    firmware gives the attackers God-like control of the system in    a way that is stealthy and persistent even through software    updates. The module, named nls_933w.dll, is the first of its    kind found in the wild and is used with both the EquationDrug    and GrayFish spy platforms Kaspersky uncovered.  <\/p>\n<p>    It also has another capability: to    create invisible storage space on the hard drive to hide data    stolen from the system so the attackers can retrieve it later.    This lets spies like the Equation Group bypass disk encryption    by secreting documents they want to seize in areas that dont    get encrypted.  <\/p>\n<p>    Kaspersky has so far uncovered 500    victims of the Equation Group, but only five of these had the    firmware-flashing module on their systems. The flasher module    is likely reserved for significant systems that present special    surveillance challenges. Costin Raiu, director of Kasperskys    Global Research and Analysis Team, believes these are    high-value computers that are not connected to the internet and    are protected with disk encryption.  <\/p>\n<p>    Heres what we know about the    firmware-flashing module.  <\/p>\n<p>    Hard drive disks have a    controller, essentially a mini-computer, that includes a memory    chip or flash ROM where the firmware code for operating the    hard drive resides.  <\/p>\n<p>    When a machine is infected with    EquationDrug or GrayFish, the firmware flasher module gets    deposited onto the system and reaches out to a command server    to obtain payload code that it then flashes to the firmware,    replacing the existing firmware with a malicious one. The    researchers uncovered two versions of the flasher module: one    that appears to have been compiled in 2010 and is used with    EquatinoDrug and one with a 2013 compilation date that is used    with GrayFish.  <\/p>\n<p>    The Trojanized firmware lets    attackers stay on the system even through software updates. If    a victim, thinking his or her computer is infected, wipes the    computers operating system and reinstalls it to eliminate any    malicious code, the malicious firmware code remains untouched.    It can then reach out to the command server to restore all of    the other malicious components that got wiped from the    system.  <\/p>\n<p>    Even if the firmware itself is    updated with a new vendor release, the malicious firmware code    may still persist because some firmware updates replace only    parts of the firmware, meaning the malicious portions may not    get overwritten with the update. The only solution for victims    is to trash their hard drive and start over with a new    one.  <\/p>\n<p>    The attack works because firmware    was never designed with security in mind. Hard disk makers    dont cryptographically sign the firmware they install on    drives the way software vendors do. Nor do hard drive disk    designs have authentication built in to check for signed    firmware. This makes it possible for someone to change the    firmware. And firmware is the perfect place to conceal malware    because antivirus scanners dont examine it. Theres also no    easy way for users to read the firmware and manually check if    its been altered.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661467\/s\/43ae3714\/sc\/4\/l\/0L0Swired0N0C20A150C0A20Cnsa0Efirmware0Ehacking0C\/story01.htm\/RK=0\/RS=KOD7Y3YeP3XC2p93Ln2G13URaCo-\" title=\"How the NSAs Firmware Hacking Works and Why Its So Unsettling\">How the NSAs Firmware Hacking Works and Why Its So Unsettling<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drives firmware with malicious code. The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmwarethe guts of any computersurpasses anything else they had ever seen. The hacking tool, believed to be a product of the NSA, is significant because subverting the firmware gives the attackers God-like control of the system in a way that is stealthy and persistent even through software updates <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-the-nsas-firmware-hacking-works-and-why-its-so-unsettling\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-58370","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/58370"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=58370"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/58370\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=58370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=58370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=58370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}