NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

3 replies [Last post]
SuperTramp83

I am a translator!

Offline
Joined: 10/31/2014
SuperTramp83

I am a translator!

Offline
Joined: 10/31/2014

Can flash any proprietary nasty firmware in several components of dat lappy, not only the BIOS.

gnu4
Offline
Joined: 11/06/2015

I remember reading the following articles when they were first released:

http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation_group/

http://www.kaspersky.com/about/news/virus/2015/Equation-Group-The-Crown-Creator-of-Cyber-Espionage

Quoting from the latter article:

"WHAT MAKES THE EQUATION GROUP UNIQUE?

Ultimate persistence and invisibility

GReAT [Kaspersky Lab’s Global Research and Analysis Team] has been able to recover two modules which allow reprogramming of the hard drive firmware of more than a dozen of the popular HDD brands. This is perhaps the most powerful tool in the Equation group’s arsenal and the first known malware capable of infecting the hard drives.

By reprogramming the hard drive firmware (i.e. rewriting the hard drive’s operating system), the group achieves two purposes:

1. An extreme level of persistence that helps to survive disk formatting and OS reinstallation. If the malware gets into the firmware, it is available to “resurrect” itself forever. It may prevent the deletion of a certain disk sector or substitute it with a malicious one during system boot.

“Another dangerous thing is that once the hard drive gets infected with this malicious payload, it is impossible to scan its firmware. To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware” – warns Costin Raiu, Director of the Global Research and Analysis Team at Kaspersky Lab.

2. The ability to create an invisible, persistent area hidden inside the hard drive. It is used to save exfiltrated information which can be later retrieved by the attackers. Also, in some cases it may help the group to crack the encryption: “Taking into account the fact that their GrayFish implant is active from the very boot of the system, they have the ability to capture the encryption password and save it into this hidden area,” explains Costin Raiu."

SuperTramp83

I am a translator!

Offline
Joined: 10/31/2014

I've read the pdf at the time. Scary **illegal** stuff indeed. An attacker would first need to remotely exploit your OS to install the malicious firmware. This, if you happen to live outside the US of Avarice. If you are the lucky USA dweller they simply (and legally tx to the Patriot Act) pay a visit to your home while you're at work. It takes 5 minutes. That is if you are an interesting enough dood.
All the more reasons for hardening your system and the internet facing applications (browser in primis I guess). Isn't it wonderful that we could go to jail for stealing some food, or whatever, in a store while those fascists do whatever pops into their vicious minds not only unpunished but highly rewarded?