LightEater malware attacks uEFI BIOSes
Click here to post a comment for LightEater malware attacks uEFI BIOSes on our message forum
Extraordinary
moab600
If there is anything i can say about Asus bios updates for mobo, is that they are frequent and good, job well done.
Unlike support for xonar series... if that pose a threat i hope they release counter bios fast.
BarryB
My latest BIOS I flashed last September! So, do we need another BIOS update to patch this exploit or will it just be left as they think no one will actually use it?
Extraordinary
http://www.guru3d.com/articles-pages/asus-crosshair-v-formula-review,1.html
The last BIOS update for the CHvF was October 2012
This review of my ASUS CHvF board is in August 2011
Glasofruix
CalculuS
So ASRock is out on this one? 😀
Fender178
Interesting. I flashed my BIOS on my ASUS Z97-pro to 1204 which had been the latest for a while until they released another update to allow compatibility with Broadwell Cpus. This makes me wonder if this effects BIOSes on boards they mentioned that have never ever been flashed/patched by the user.
moab600
Extraordinary
Looks like Intel boards are getting BIOS updates for longer than AMD boards with ASUS
moab600
Fox2232
The Laughing Ma
Maybe I missed it in the article but how exactly does the system become infected in the first place? I mean it's all well talking about BIOS updates but if the only method of infection requires someone with a USB stick to have direct access to the computer then it's all a bit pointless then isn't it?
cpy2
Good thing i don't use BIOS anymore, long live UEFI.
Extraordinary
UEFI is still a BIOS for all intents and purposes and can generally be switched back to Legacy BIOS too
EDIT -
The problem affects motherboards from companies including Gigabyte, Acer, MSI, HP and Asus. It is exacerbated by manufactures reusing codes across multiple UEFI BIOSes and places home users, businesses and governments at risk.
sykozis
Prince Valiant
Maybe now the MB manufacturers will stop saying that updating your BIOS is at your own risk. I try to keep my BIOS up to date but it can be a pain sometimes. I ended up having to flash my current board with the internet option because the USB method failed every time.
mmicrosysm
Saw this coming.
waltc3
I noted in this story the word "implant"...this seems to denote hardware and the implication is that if you cannot get your hands on a machine physically you cannot "implant" [whatever it is] and cannot crack secure boot. The nature of this "implant" is murky at best...
Also, nobody knows what the NSA does and what it doesn't do. I'm amazed at all of the self-appointed NSA spokespersons there are for the NSA these days...;) People don't work for the NSA and yet think they know "all about it"....strange, but true...
I think lots of people may be running their UEFI in Legacy mode without realizing it...run msinfo32 to check...if you see the following two entries you are OK:
Bios mode UEFI
Secure boot state ON
If you have UEFI but you are not using secure boot, those entries will read:
Bios mode LEGACY
Secure boot state OFF
and you are not getting the security benefit of your UEFI when it runs in Legacy mode.
mbk1969
Jahooba
I just built a computer with a UEFI BIOS and I can understand why it's vulnerable, but the software does make it much easier to update. The motherboard I got (ASUS) came with some management software that downloads and patches the BIOS in seconds, automatically.
I guess the real problem is when ASUS move on and stop supporting that motherboard.