http://www.intelsecurity.com/advanced-threat-research/blog.html
From the paper:
Updating the SPI flash, where system firmware is usually stored, is usually accomplished either through physically attaching a programmer to the chip or through a signed update mechanism built into the firmware. One of the leaked emails contains a presentation (presumably for potential customers) that describes this:
Explanations:
- "Attaching a programmer to the chip" - well known - supply chain attack or "black bag job"
- "Signed update mechanism" - presumed, but important since I think this is much more common on enterprise systems over personal or consumer
If you support enterprise systems, you can consider yourself a target.
I'm sorry their email was compromised, but they're doing bad things, and they're not an entertainment company here, trash talking movie stars. They're targeting me and my clients/sponsors - the contents of the emails and files are fair game for us to protect ourselves.
How do I protect myself or my clients?
From the paper:
Intel has released CHIPSEC, which contains various tests and tools for platform security assessment, including some forensic capabilities.
They go on to give examples of how to use and what the results mean, and most importantly:
Installing [the Hacking Team] firmware rootkit involves rewriting SPI flash. The system firmware is responsible for securely configuring the protections on SPI flash in order to prevent this. CHIPSEC contains configuration checks that users can easily run:This does not mean that the system is infected, but it would be harder to infect a system that passes this test than one that fails.If this test fails, it may be possible for software running on the system to modify the BIOS in the SPI flash due to insecure configuration of the hardware protections.
- python chipsec_main.py -m common.bios_wp
This means to me that you'll need python to run it (go figure, we're on windows, guys) , but I'll spin it up on a couple of machines to see what happens
P
No comments:
Post a Comment