Equation Group : Hard disk firmware infection
My renewed interest in computer security was triggered by the wonderfully detailed article on Ars Technica about the alleged NSA program , dubbed Equation group, to plant code into hard disk firmware. The beauty of the approach was that this could be:
The biggest reason why I was so intrigued by this event is the article itself. It is detailed when it needs to be and brief where it needs to be. Its perfect for someone who wants to understand the issue and has just a little knowledge of what computer systems are. Read it. This article is a thing of beauty.
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
Lenovo's Superfish disaster
My interest was soon rewarded by the revelation of another big issue in the field of computer security.
This time, it was a malware/adware/bloatware that came installed in Lenovo laptops by default. As the story unfolded, it became clear that the issue went farther than just unwanted software on the computer. The SDK used to create the software - provided by Komodia - by a company named Superfish used root certificates to intercept HTTP traffic on the laptops to inject ads onto websites. The software would just be classified as malware, were it not for:
This story broke on Twitter and I was following these revelations as they were being published. It was quite the experience to watch an issue grow from an unwanted software to a full-blown security vulnerability.
Miscellaneous
Then there was :
Security in the digital age is about constant surveillance and in-depth knowledge of how systems work. The last week has been very interesting in terms of computer security that has wide ranging effects.
My renewed interest in computer security was triggered by the wonderfully detailed article on Ars Technica about the alleged NSA program , dubbed Equation group, to plant code into hard disk firmware. The beauty of the approach was that this could be:
- Done over the internet - through a compromised system
- Impossible to detect via a scan - only a detailed network analysis could expose this
- The way in which it was exposed by Kaspersky Labs - partly by taking over expired domains that acted as control centers.
The biggest reason why I was so intrigued by this event is the article itself. It is detailed when it needs to be and brief where it needs to be. Its perfect for someone who wants to understand the issue and has just a little knowledge of what computer systems are. Read it. This article is a thing of beauty.
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
Lenovo's Superfish disaster
My interest was soon rewarded by the revelation of another big issue in the field of computer security.
This time, it was a malware/adware/bloatware that came installed in Lenovo laptops by default. As the story unfolded, it became clear that the issue went farther than just unwanted software on the computer. The SDK used to create the software - provided by Komodia - by a company named Superfish used root certificates to intercept HTTP traffic on the laptops to inject ads onto websites. The software would just be classified as malware, were it not for:
- MITM (Man In The Middle) attack required to serve the ads
- Root certificate that was allowed for all purposes installed in the computer by the OEM
- The private key of the root certificate was komodia, which is not just a bad password, but was the same on all systems. This private key could be used to sign websites that would be accepted by the infected system.
- The SDK handled invalid certificates and the pages that presented them by signing the websites with the private key and changing the primary site name to force a failure, leaving alernate sites mentioned in the site unchanged
This story broke on Twitter and I was following these revelations as they were being published. It was quite the experience to watch an issue grow from an unwanted software to a full-blown security vulnerability.
Miscellaneous
Then there was :
- Samsung smart tv privacy issues. They use ssl to communicate, but the traffic is not encrypted.
- NSA/GHCQ hack into Gemalto to get SIM keys
- Uber's database goof-up. They stored their database key on Git Hub!
- CIA chief
Security in the digital age is about constant surveillance and in-depth knowledge of how systems work. The last week has been very interesting in terms of computer security that has wide ranging effects.
Comments
Post a Comment