News

BIOS Vulnerability Still Roaming Wild despite Warnings

A multi-year effort to prevent hackers from altering computers while they boot up has largely failed and the flaws are still being exploited despite their disclosures. According to researchers from the federal founded MITRE lab, many Intel customers have still not adopted the revised security design distributed in March after even more vulnerabilities were discovered.

This could leave many newer Windows computers exposed, MITRE told Reuters ahead of their Black Hat presentation.

Intel’s point person on the issue, Bruce Monroe, said that he didn’t know how many suppliers and computer makers had followed Intel’s recommendations. “We’re not privy to whether they’ve fixed it or not. We asked them to let us know.”

The NSA Director Keith Alexander already urged the chief executives of major American technology companies years ago to do something about the boot-up procedure (BIOS). Because the start-up code is given more authority, hackers who break the code can make major changes to programs and hide their presence as well as survive power-down and reboots.

The successor called Unified Extensible Firmware Interface (UEFI) is widely adopted now and has features like secure boot where digital signatures are checked before code is run. Microsoft was one of the first to embrace the new system with their Windows 8.

With flaws like this, it’s no surprise that well-funded spying programs as those exposed by Edward Snowden can continue to succeed against targets that depend on a complex supply chain.

MITRE made a similar presentation at last years Black Hat conference where Corey Kallenberg and Xeno Kovah broke into Dell’s boot-up process. Since the talk they have deployed sensors to about 10.000 computers to determine whether the boot procedures were still vulnerable. A shocking 55 percent of them still were, but the actual percentage is said to be even higher as the checks were done by Intel’s old UEFI guidelines that still allowed for memory corruption.

The threat is very real as shown for recent events. The 2011 Mebromi attack on Chinese computers using the Phoenix BIOS, last years report by Der Spiegel about the NSA tool called DeityBounce and just earlier this year Reuters reported about a U.S. Defense Contractors product, priced over $100k, for “incapacitating target computers by attacking BIOS and other critical elements”.

Thank you Reuters for providing us with this information

Images courtesy of Hardware Analysis

Bohs Hansen

Disqus Comments Loading...

Recent Posts

Refract Gaming Crimson – Home & Casual Pre-Built Gaming PC

Pre-built gaming PC for casual and entry-level gaming Cherry-picked hardware and hand-built by Overclockers UK’s…

4 hours ago

MSI NVIDIA GeForce GT 1030 LP OC 2048MB DDR4 PCI-Express Graphics Card

One of the deciding factors in performance is the quality of the components used. That…

4 hours ago

LG 27″ Ultragear 27GS60F-B 1920×1080 IPS 180Hz 1ms Widescreen Gaming Monitor

We have raised UltraGear's speed standard from 144Hz to 180Hz. You can enjoy ultra-clear and…

4 hours ago

Cooler Master Mobius 140P ARGB High Performance Fan

Cooler Master’s Mobius 140P ARGB is our new series of performance fans. With our enhanced…

4 hours ago

Ducky Mecha Mini 60% RGB USB Mechanical Gaming Keyboard

MINIATURE DESIGNFull aluminum casing Durable exceptional reliable performance USB HID with the highest frequency of…

4 hours ago

MSI 32″ MAG 32C6X 1920×1080 VA 250Hz 1ms A-Sync Curved Gaming Monitor

Visualize your victory with the MSI MAG 32C6X gaming monitor. Equipped with a 1920x1080, 250Hz(OC)…

4 hours ago