article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. Starks Federal Communications Commission member Geoffrey Starks recently alluded to the possibility that China may have secretly coded the firmware in Huawei’s equipment to support cyber espionage and cyber infrastructure attacks. telecoms by Chinese tech giant Huawei.

Firmware 233
article thumbnail

Second-ever UEFI rootkit used in North Korea-themed attacks

Security Affairs

The experts were investigating several suspicious UEFI firmware images when discovered four components, some of which were borrowing the source code a Hacking Team spyware. In 2015, the hacker who breached the systems of the Italian surveillance firm Hacking Team leaked a 400GB package containing hacking tools and exploits codes.

Firmware 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

It can even access the chip’s firmware to gain root access on the device, a significant privilege escalation. Standard approaches such as endpoint protection , aggressive patch management, and zero-trust architectures are effective ways to mitigate zero-click threats.

Spyware 125
article thumbnail

Overview of IoT threats in 2023

SecureList

See translation Will buy 0day/1day RCE in IoT Escrow See translation Hi, I want to buy IoT exploits with devices located in Korea Any architecture There are also offers to purchase and sell IoT malware on dark web forums, often packaged with infrastructure and supporting utilities. Therefore, we did not issue a certificate.

IoT 86
article thumbnail

A bowl full of security problems: Examining the vulnerabilities of smart pet feeders

SecureList

The findings of the study reveal a number of serious security issues, including the use of hard-coded credentials, and an insecure firmware update process. We later managed to extract the firmware from the EEPROM for further static reverse engineering. Further hardware analysis of the circuit board helped us identify chips.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

The Mirai botnet contributed to a massive denial of service attack that brought parts of the Internet to a standstill, what was remarkable was that Mariah was constructed from 1000s of Internet of Things devices, namely surveillance cameras. In some cases the artists simply don't have the resources to be updated.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

The Mirai botnet contributed to a massive denial of service attack that brought parts of the Internet to a standstill, what was remarkable was that Mariah was constructed from 1000s of Internet of Things devices, namely surveillance cameras. In some cases the artists simply don't have the resources to be updated.

IoT 52