Article 5ACBC Hackers can use just-fixed Intel bugs to install malicious firmware on PCs

Hackers can use just-fixed Intel bugs to install malicious firmware on PCs

by
Dan Goodin
from Ars Technica - All content on (#5ACBC)
locked-down-laptop-800x514.jpg

Enlarge (credit: Getty Images)

As the amount of sensitive data stored on computers has exploded over the past decade, hardware and software makers have invested increasing amounts of resources into securing devices against physical attacks in the event that they're lost, stolen, or confiscated. Earlier this week, Intel fixed a series of bugs that made it possible for attackers to install malicious firmware on millions of computers that use its CPUs.

The vulnerabilities allowed hackers with physical access to override a protection Intel built into modern CPUs that prevents unauthorized firmware from running during the boot process. Known as Boot Guard, the measure is designed to anchor a chain of trust directly into the silicon to ensure that all firmware that loads is digitally signed by the computer manufacturer. Boot Guard protects against the possibility of someone tampering with the SPI-connected flash chip that stores the UEFI, which is a complex piece of firmware that bridges a PC's device firmware with its operating system.

Hardware-enforced security

These types of hacks typically happen when attackers attach hardware to the insides of a computer and use Dediprog or similar chip programming tools to replace authorized firmware with malicious firmware.

Read 9 remaining paragraphs | Comments

index?i=quc5P8PNRsE:zMZ2d33lNlQ:V_sGLiPB index?i=quc5P8PNRsE:zMZ2d33lNlQ:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments