viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?
Technology

Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?

19/04/2022

Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?

Getty Images

Lenovo has released security updates for more than 100 laptop models to fix critical vulnerabilities that make it possible for advanced hackers to surreptitiously install malicious firmware that can be next to impossible to remove or, in some cases, to detect.

Three vulnerabilities affecting more than 1 million laptops can give hackers the ability to modify a computer’s UEFI. Short for Unified Extensible Firmware Interface, the UEFI is the software that bridges a computer’s device firmware with its operating system. As the first piece of software to run when virtually any modern machine is turned on, it’s the initial link in the security chain. Because the UEFI resides in a flash chip on the motherboard, infections are difficult to detect and even harder to remove.

Oh, no

Two of the vulnerabilities—tracked as CVE-2021-3971 and CVE-2021-3972—reside in UEFI firmware drivers intended for use only during the manufacturing process of Lenovo consumer notebooks. Lenovo engineers inadvertently included the drivers in the production BIOS images without being properly deactivated. Hackers can exploit these buggy drivers to disable protections, including UEFI secure boot, BIOS control register bits, and protected range register, which are baked into the serial peripheral interface (SPI) and designed to prevent unauthorized changes to the firmware it runs.

After discovering and analyzing the vulnerabilities, researchers from security firm ESET found a third vulnerability, CVE-2021-3970. It allows hackers to run malicious firmware when a machine is put into system management mode, a high-privilege operating mode typically used by hardware manufacturers for low-level system management.

Advertisement

“Based on the description, those are all pretty ‘oh no’ sorts of attacks for sufficiently advanced attackers,” Trammel Hudson, a security researcher specializing in firmware hacks, told Ars. “Bypassing SPI flash permissions is pretty bad.”

He said the severity may be lessened by protections such as BootGuard, which is designed to prevent unauthorized people from running malicious firmware during the boot process. Then again, researchers in the past have uncovered critical vulnerabilities that subvert BootGuard. They include a trio of flaws discovered by Hudson in 2020 that prevented the protection from working when a computer came out of sleep mode.

Creeping into the mainstream

While still rare, so-called SPI implants are growing more common. One of the Internet’s biggest threats—a piece of malware known as Trickbot—in 2020 began incorporating a driver into its code base that allows people to write firmware into virtually any device.
The only two other documented cases of malicious UEFI firmware being used in the wild are LoJax, which was written by the Russian state hacker group known under multiple names, including Sednit, Fancy Bear, or APT 28. The second instance was UEFI malware that security firm Kaspersky discovered on diplomatic figures’ computers in Asia.

All three of the Lenovo vulnerabilities discovered by ESET require local access, meaning that the attacker must already have control over the vulnerable machine with unfettered privileges. The bar for that kind of access is high and would likely require exploiting one or more critical other vulnerabilities elsewhere that would already put a user at considerable risk.

Still, the vulnerabilities are serious because they can infect vulnerable laptops with malware that goes well beyond what’s normally possible with more conventional malware. Lenovo has a list here of more than 100 models that are affected.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Ransomware attack on Planned Parenthood steals data of 400,000 patients
Ransomware hackers broke into a Planned Parenthood network and accessed …

Ransomware attack on Planned Parenthood steals data of 400,000 patients

COVID-KG uses AI to scan thousands of studies to answer doctors’ coronavirus questions
The number of studies about COVID-19 has risen steeply from …

COVID-KG uses AI to scan thousands of studies to answer doctors’ coronavirus questions

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • 2020 will be a big year for online childcare — here are 7 startups to watch
    Watch SpaceX launch a new batch of …
    06/01/2020
  • Rensselaer focuses IBM’s AiMOS supercomputer on machine learning
    IBM’s new cobalt-free battery uses materials extracted …
    19/12/2019
  • Carnegie Mellon researchers propose AI that surfaces positive online comments
    MIT CSAIL’s TextFooler generates adversarial text to …
    08/02/2020
  • Indian B2B food tech startup HungerBox raises $12M from Paytm and others – TechCrunch
    Indian B2B food tech startup HungerBox raises …
    17/12/2019
  • Reliance launches JioMart online grocery service, challenging Amazon and Flipkart
    Reliance launches JioMart online grocery service, challenging …
    26/05/2020

Popular Posts

  • Omnipotent BMCs from QCT remain vulnerable to critical Pantsdown threat
    Omnipotent BMCs from QCT remain vulnerable to …
    26/05/2022 0
  • 10 of the Most Random Reality Shows …
    28/04/2022 0
  • 10 More Modern Conveniences That Met with …
    28/04/2022 0
  • One of the most powerful DDoSes ever targets cryptocurrency platform
    One of the most powerful DDoSes ever …
    28/04/2022 0
  • 10 People Who Did Terrible Things Because …
    29/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh