Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Corsair Xeneon 27QHD240 OLED monitor review
ASUS Radeon RX 7600 STRIX OC review
Corsair RM1200X SHIFT 1200W PSU Review
Intel NUC 13 Pro (Arena Canyon) review
Endorfy Arx 700 Air chassis review
Beelink SER5 Pro (Ryzen 7 5800H) mini PC review
Crucial T700 PCIe 5.0 NVMe SSD Review - 12GB/s
Sapphire Radeon RX 7600 PULSE review
Gainward GeForce RTX 4060 Ti GHOST review
Radeon RX 7600 review

New Downloads
AMD Ryzen Master Utility Download 2.10.3.2504
CrystalDiskInfo 9.0.1a Download
AMD Radeon Software Adrenalin 23.5.2 WHQL download
Intel ARC graphics Driver Download Version: 31.0.101.4382
Corsair Utility Engine Download (iCUE) Download v5.2
GeForce 535.98 WHQL driver download
CPU-Z download v2.06
AMD Radeon Software Adrenalin 23.5.1 WHQL download
GeForce 532.03 WHQL driver download
AMD Chipset Drivers Download 5.05.16.529


New Forum Topics
GeForce RTX 3060 and Asus Rampage ii extreme lga 775 msi motherboard problems NVIDIA Power Management (NVPMM) - NVIDIA Power Limit Profile (NVPL Profile) GeForce NOW Account Integration with Steam, Epic Games Store and Ubisoft BSODs caused by AMD drivers, multiple times a day... but.... PC restarting / multiple copies of drivers? or HW AMD's Future Developments: Ryzen 8000 and Navi 3.5 PSA: 535 system stability concerns. mmagent registry settings path Amernime Zone AMD Software: Adrenalin / Pro Driver - Discovery Remix 23.4.2 WHQL [Omega 23.5.1 WIP]




Guru3D.com » News » LightEater malware attacks uEFI BIOSes

LightEater malware attacks uEFI BIOSes

by Hilbert Hagedoorn on: 03/21/2015 01:36 PM | source: | 55 comment(s)
LightEater malware attacks uEFI BIOSes

I've been wondering about UEFI BIOSes myself for a while now, sure they look and work great, but an uEFI BIOS is an OS on its own, and as such rather vulnerable. At the security conference CanSecWest, security researchers Corey Kallenberg and Xeno Kovah revealed that even an unskilled person could use an implant called LightEater to infect a vulnerable system in mere moments.

An unpatched BIOS can easily be infected with malware or a virus. Motherboards from companies like Gigabyte, Acer, MSI, HP and Asus are at risk, especially if you are not updating your BIOS on a regular basis towards the latest revision (and let's be frank here, who does ?). 

As betanews writes the following on the topic, Introducing the vulnerability, Kallenberg and Kovah said:

So you think you're doing OPSEC right, right? You're going to crazy lengths to protect yourself, reinstalling your main OS every month, or using a privacy-conscious live DVD like TAILS. Guess what? BIOS malware doesn't care! BIOS malware doesn't give a shit!

The malware can be used to infect huge numbers of systems by creating SMM (System Management Mode) implants which can be tailored to individual BIOSes with simple pattern matching. A BIOS from Gigabyte was found to be particularly insecure.

We didn't even have to do anything special; we just had a kernel driver write an invalid instruction to the first instruction the CPU reads off the flash chip, and bam, it was out for the count, and never was able to boot again.

The vunerability is something that has already been exploited by the NSA, but the researchers are encouraging businesses and governments to take the time to install BIOS patches that plug the security hole.

 







« Download SSD-Z v15.03.15b · LightEater malware attacks uEFI BIOSes · Gigabyte Launches 990XA-UD3 R5 Socket AM3+ Motherboard »

11 pages « < 7 8 9 10 > »


TheDeeGee
Senior Member



Posts: 8890
Joined: 2010-08-28

#5034455 Posted on: 03/22/2015 01:00 PM
Mine (F10) is from September 5th 2014 which is the latest.

Guess it needs an update aswell.

Pill Monster
Senior Member



Posts: 25214
Joined: 2007-08-23

#5034497 Posted on: 03/22/2015 02:16 PM
You used to be able to use unsigned images by flashing the system using USB Flashback, but I think they eventually patched it out. At the same time if you were to try and inject malware into the system using that feature you'd have physically be at the machine. So I'd think Asus boards are pretty safe from this?
Yes, exactly. :)
Even without digital signing the image had to be original, meaning oproms can be inserted but nothing modified/injected (my understanding at least).

But Eeproms programmed with Aptio V (X99) are now signed with an AMI keycode.
In order to flash a malicious image you would quite literally need to be standing at the machine with a hardware SPI flasher in your hand.

So yeah...I think we can relax for now. lol

Rich_Guy
Senior Member



Posts: 13042
Joined: 2003-05-11

#5034549 Posted on: 03/22/2015 04:23 PM
I just follow the general rule of "if it ain't broken, don't fcking touch it", since you know, updating a bios is not without risks.


Same here, im still running the 1004 BIOS on mine, theres 2x newer, but its working fine.

waltc3
Senior Member



Posts: 1443
Joined: 2014-07-22

#5034552 Posted on: 03/22/2015 04:26 PM
Hi guys, sorry i am really noob to this uefi and new systems. I didnt build this system, and didnt install main OS either. Have win7 and win8.1(installed later) dual boot. Asus Z87-Deluxe with 1405 Bios

I looked msinfo32 and found only 2 lines about bios.





And i gone to bios and searched secure boot option, it was saying "Enabled", and security Key "loaded" (not sure exact option name). All two options grayed out. And below there is another option that takes me to KEY options.

Am i safe now?

Thanks.

edit: learned how to take bios screenshot, so here are the images of those options.

And i saw that my main SSD win7 OS is not labeled as UEFI at main bios screen. After inserting my USB stick i saw UEFI label on it , but not on main SSD.

http://i.imgur.com/oZcdeoL.png
http://i.imgur.com/B1xZz9m.png
http://i.imgur.com/klSBJbD.png


UEFI really didn't take off until a good while after Win7 shipped, and from what you say here it appears you have a standard bios and do not have a UEFI system. (Pay no attention to the UEFI markings on your USB stick--that's just advertising... ;)) The main point to UEFI is the secure-boot function, which was designed to stop viruses and other malware that were getting into bioses and systems ahead of the operating system at boot time--before the OS AV components could act to eradicate it. Coming in under the OS like that a nasty bit of software could actually take over a machine without having to go through the OS at all--and secure-boot UEFI eliminates that possibility (pretty much) and because it's a program accessible to the OS that means that any OS-resident AV software can see right down through the UEFI--and if it spots a nasty can act to kill it from the OS level after the system boots. The older, standard bios has no protection during boot and if something gets into the bios it probably wouldn't allow itself to be flashed out of existence, so the only way to fix it would be to pop in a new bios chip.

Chances of ordinary people running into something like this even with a standard bios is very remote. This is the kind of thing you see in a targeted attack, usually espionage at the corporate level. But even there it is not at all common--at least as far as detection goes... ;)

sykozis
Senior Member



Posts: 22472
Joined: 2008-07-14

#5034558 Posted on: 03/22/2015 04:34 PM
So yeah...I think we can relax for now. lol


I wasn't worried any way. They made a huge deal about "BIOS virus" more than a decade ago, and how many were actually found "in the wild" since then? The only ones I know, were created by "security" companies and never released onto the web. They also required physical access to the system.

11 pages « < 7 8 9 10 > »


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2023