article thumbnail

CSO: Gigabyte firmware component can be abused as a backdoor

Security Boulevard

Attackers can abuse the UEFI firmware to inject executable malware code into the Windows kernel, compromising systems. Read More > The post CSO: Gigabyte firmware component can be abused as a backdoor appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

CSO 52
article thumbnail

3 ways to prevent firmware attacks without replacing systems

CSO Magazine

A recent security post warned that firmware attacks are on the rise. They cited a survey of 1,000 cybersecurity decision makers at enterprises across multiple industries in the UK, US, Germany, Japan, and China finding that that 80% of firms have experienced at least one firmware attack in the past two years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Flaws in Dell's over-the-air device recovery and update impacts millions of devices

CSO Magazine

The over-the-internet firmware update and OS recovery feature present in 128 Dell computer models suffers from certificate validation and other flaws that could allow man-in-the-middle (MitM) attackers to compromise the devices at the firmware level and deploy malicious implants. Sign up for CSO newsletters. ].

Firmware 111
article thumbnail

MoonBounce UEFI implant used by spy group brings firmware security into spotlight

CSO Magazine

While MoonBounce is not the first UEFI rootkit found in the wild -- LoJax , MosaicRegressor are two examples-- these types of implants are not common because they require knowledge of low-level firmware programming. They are typically found in the arsenal of well-resourced and sophisticated attacker groups.

Firmware 116
article thumbnail

Gigabyte firmware component can be abused as a backdoor

CSO Magazine

Researchers warn that the UEFI firmware in many motherboards made by PC hardware manufacturer Gigabyte injects executable code inside the Windows kernel in an unsafe way that can be abused by attackers to compromise systems. Sophisticated APT groups are abusing similar implementations in the wild.

Firmware 103
article thumbnail

Flaws in MegaRAC baseband management firmware impact many server brands

CSO Magazine

Researchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple server manufacturers. If exploited, the flaws could allow attackers to remotely control servers, deploy malware and firmware implants, or trigger damaging actions that leave them inoperable.

article thumbnail

37 hardware and firmware vulnerabilities: A guide to the threats

CSO Magazine

In January 2018, the entire computer industry was put on alert by two new processor vulnerabilities dubbed Meltdown and Spectre that defeated the fundamental OS security boundaries separating kernel and user space memory.

Firmware 138