Computrace backdoor exposes millions of PCs

by
Anonymous Coward
in security on (#9RJV)
Security researchers have discovered millions of PCs have Computrace software enabled. This software is enabled in the BIOS by default. It allows for a Windows PC to be taken over remotely. Computrace does not enforce encryption when it communicates and it does not verify the identity of the remote server from which it receives commands. Most users are not even aware that this software is installed and enabled in their BIOS.

Nearly every PC has an anti-theft product called Computrace embedded in its BIOS PCI Optional ROM or its unified extensible firmware interface (UEFI). Computrace (aka. Lojack for Laptops) is a legitimate, trusted application developed by Absolute Software. However, it often runs without user-consent, persistently activates itself at system boot, and can be exploited to perform various attacks and to take complete control of an affected machine.

Windows only? (Score: 1, Informative)

by Anonymous Coward on 2015-05-26 13:37 (#9SBJ)

Back when I used to manage Windows laptops (mostly IBM/Lenovo), it seemed that:

(1) the Computrace thing was only capable of "hacking" your Windows install; wipe and install, say Ubuntu, and Computrace can't do anything.

(2) the BIOS usually offered three settings, forgive me that I'm fuzzy on the exact same wording, Inactive (meaning it hacks you and phones home but pretends it doesn't), Enabled (hacks you, phones home, if you've paid you can track it), Disabled (doesn't hack you, but doesn't un-hack you if you already are). The last two are permanent choices, once you pick either of those you can never undo it. Flashing the BIOS has no effect.

Anybody know if these are still true?
Post Comment
Subject
Comment
Captcha
Enter the number thirty seven thousand six hundred and forty four in digits: