TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Introducing Ring -3 Rootkits: BIOS rootkit targeting vPro chipsets (2009) [pdf]

74 pointsby devconsoleabout 11 years ago

11 comments

devconsoleabout 11 years ago
Highlights from the slides:<p>Your CPU chipset is also standalone webserver. Most vPro chipsets (MCHs) have:<p>- An Independent CPU (not IA32!)<p>- Access to dedicated DRAM memory<p>- Special interface to the Network Card (NIC)<p>- Execution environment called Management Engine (ME)<p>Your chipset is a little computer. It can execute programs in parallel and independently from the main CPU!<p>How might we design some malware that embeds itself into the chipset? Such malware would be able to survive reboots, brick the hardware on demand, reboot on demand, act as a MITM for all network traffic, inject vulnerabilities into the host OS during bootup, etc.<p>Step 1: Search for an attack vector in any version of the Intel BIOS. If you can find any attack vector in any version of the BIOS, you&#x27;ve won. For example, if the latest Intel BIOS is v3.9.2, but you found an exploit in BIOS v2.3.1, you&#x27;ve still won. Because...<p>Step 2: ... as the attacker, you can downgrade the victim&#x27;s BIOS to any previous version without any user consent! Any old version of the BIOS is of course signed by Intel; all versions are. The chipset firmware allows any valid signed BIOS to replace the current BIOS regardless of whether it&#x27;s older or newer than the current.<p>It was pretty shocking that the BIOS can be downgraded without any user consent. Downgrading requires a reboot, but that&#x27;s probably not a huge problem in practice.<p>This article is from 2009, so at this point it&#x27;s just an interesting piece of history. But I wonder whether any of these issues still persist today, such as the ability for userspace programs to downgrade&#x2F;upgrade the BIOS at will?
评论 #7453548 未加载
评论 #7456402 未加载
t0mas88about 11 years ago
So if I understand correctly this can be used to install a persistent hardware rootkit on the chipset that listens for a &quot;secret&quot; knock procedure with TCP (because it has access to the NIC) and then in response to the secret signal modify the host OS kernel through DMA-access to disable for example all access checks [1].<p>Imagine infecting a machine with this either before delivery (requires physical access, but should be doable for FBI&#x2F;NSA&#x2F;foreign-counterpart) or in a &quot;rent a server&quot; situation. Most providers will allow you to rent a full server with root-access for a month and then cancel the contract. I&#x27;m assuming those servers get re-used if they&#x27;re not too old.<p>[1] Code to disable access checks through DMA has been around for a long time: <a href="http://www.breaknenter.org/projects/inception/" rel="nofollow">http:&#x2F;&#x2F;www.breaknenter.org&#x2F;projects&#x2F;inception&#x2F;</a>
rjzzleepabout 11 years ago
you fight find this more recent work interesting:<p><a href="http://media.ccc.de/browse/congress/2013/30C3_-_5380_-_en_-_saal_2_-_201312291830_-_persistent_stealthy_remote-controlled_dedicated_hardware_malware_-_patrick_stewin.html" rel="nofollow">http:&#x2F;&#x2F;media.ccc.de&#x2F;browse&#x2F;congress&#x2F;2013&#x2F;30C3_-_5380_-_en_-_...</a><p>&gt; In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is capable of gathering valuable information such as passwords. Because the infected hardware can perform arbitrary main memory accesses, the malware can modify kernel data structures and escalate privileges of processes executed on the system.<p>&gt; The malware itself is a DMA malware implementation referred to as DAGGER. DAGGER exploits Intel’s Manageability Engine (ME), that executes firmware code such as Intel’s Active Management Technology (iAMT), as well as its OOB network channel. We have recently improved DAGGER’s capabilites to include support for 64-bit operating systems and a stealthy update mechanism to download new attack code.<p>edit: you still have to first get the malware in though
userbinatorabout 11 years ago
This is another excellent example of when security-through-obscurity fails; the vPro environment docs are presumably NDA-only (or never released outside Intel), but reverse-engineers will figure things out anyway, and they&#x27;re not really willing to disclose how much they know...<p>None of my machines have vPro; I remember someone I know calling it &quot;the ultimate pre-installed RAT&quot; when it first came out.<p>Another interesting little fact: Intel&#x27;s wireless cards, at least the 3945&#x2F;4965 generation, also use an ARC core to run their firmware.
评论 #7453454 未加载
higherpurposeabout 11 years ago
Many of these exploits &quot;we&#x27;re just learning about now&quot;, have been discussed at CCC, Defcon and Blackhat conferences in the past few years. It&#x27;s just that most people weren&#x27;t aware of them. NSA, on the other hand, has paid much attention to them.<p>Here&#x27;s another one about hardware backdooring from 2012:<p><a href="https://www.youtube.com/watch?v=tV0YqJa-0OA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=tV0YqJa-0OA</a><p>But when we discover a backdoor on Intel chips (not necessarily put there by Intel) in 5 years, everyone will probably act in shock and awe that it was possible.
jraboneabout 11 years ago
And yet the Intel product pages say<p>&quot;Prevent attacks below the operating system<p>Intel vPro technology protects against difficult-to-detect, penetrating rootkits and malware that threaten users working in cloud or virtual environments. It combines several hardware-based features, including Intel® Trusted Execution Technology (Intel® TXT)3 and Intel® Virtualization Technology (Intel® VT)4 for centralized image management and administration, secure network storage, and out-of-band protection—all beyond the firewall.&quot;<p>Irony? Or hopefully the current version of vPro as built-in to some Xeon processors is a bit more hardened...
评论 #7453978 未加载
评论 #7454371 未加载
X4about 11 years ago
Are there any ways to defend against the attack?<p>I can only think of buying AMD Chips with CoreBios instead, which of I don&#x27;t know, if they may have similar issues. Maybe buy Tilera, or other manycore chips instead?<p>This article with the title: &quot;Expert Says NSA Have Backdoors Built Into Intel And AMD Processors&quot; raises some concerns, even though I don&#x27;t know, if the source can be trusted. <a href="http://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/" rel="nofollow">http:&#x2F;&#x2F;www.eteknix.com&#x2F;expert-says-nsa-have-backdoors-built-...</a>
评论 #7453577 未加载
评论 #7456608 未加载
评论 #7453550 未加载
TazeTSchnitzelabout 11 years ago
Is this one place where the fabled BADBIOS could live?
评论 #7453763 未加载
stcredzeroabout 11 years ago
<i>Your chipset is a little computer. It can execute programs in parallel and independently from the main CPU!</i><p>So, basically, the &quot;trusting trust&quot; extends to even your chipset. Basically, the majority of people are doomed to be the subjects of those controlling the means of production. Most of those few who have the wherewithal to peer past the curtain can easily be bribed and intimidated into cooperating.<p>Tinfoil hat on: I wonder if such vulnerabilities might have been concocted as a means of sneaking backdoors into the technical projects of non-US countries?
jevinskieabout 11 years ago
Does anyone know if it is possible to get a dump of the firmware running on the vPro? I&#x27;d like to take a look in IDA!
contingenciesabout 11 years ago
Time to get off the x86 consumer hardware train. NetBSD anyone? :)