Menu
UEFI flaws can be exploited to install highly persistent ransomware

UEFI flaws can be exploited to install highly persistent ransomware

A team of researchers exploited two vulnerabilities in the firmware of Gigabyte BRIX mini PCs to demonstrate low-level ransomware

IDG

IDG

Over the past few years, the world has seen ransomware threats advance from living inside browsers to operating systems, to the bootloader, and now to the low-level firmware that powers a computer's hardware components.

Earlier this year, a team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.

On Friday, at the Black Hat Asia security conference, the team revealed how they did it: by exploiting vulnerabilities in the firmware of two models of ultra compact PCs from Taiwanese computer manufacturer Gigabyte Technology.

The two vulnerabilities affect the GB-BSi7H-6500 and GB-BXi7-5775 models of Gigabyte's Mini-PC Barebone (BRIX) platform. They allow an attacker with access to the OS to elevate their privileges and execute malicious code in System Management Mode (SMM), a special operating mode of the CPU that allows executing low-level software.

UEFI vulnerabilities are not new and researchers have presented such flaws over the years at security conferences. They're valuable for attackers because they can be used to install highly persistent malware that can reinfect an operating system even after it's completely wiped and reinstalled.

UEFI rootkits -- malicious code that's meant to hide other malware and its activities -- are perfect for cyberespionage or surveillance operations. The 2015 data leak from Italian surveillance software maker Hacking Team revealed that the company was offering a UEFI rootkit to its law enforcement and government customers.

Documents leaked recently by WikiLeaks about the U.S. CIA's cybercapabilities revealed that the agency purportedly has UEFI "implants" for Mac computers.

However, instead of demonstrating a rootkit, the Cylance researchers chose to show that ransomware can also benefit from the high-privilege position and persistence of UEFI.

Figuring out that malicious code is actually installed inside a computer's low-level firmware is hard to begin with, and removing it can also be complicated because it requires reflashing a clean UEFI image.

Gigabyte plans to release a firmware update for GB-BSi7H-6500 this month to resolve the vulnerabilities but won't patch GB-BXi7-5775 because that model has reached its end of life, the CERT Coordination Center at Carnegie Mellon University said in an advisory.

In response to the recent CIA revelations, Intel Security released a tool that can help computer administrators verify if their firmware has any malicious code.

One limiting factor for UEFI vulnerabilities is that they rarely work for a large number of computers. That's because there are several firmware/BIOS vendors in the world that provide their reference UEFI implementations to computer manufacturers, which then further customize them by adding their own code.

This means that there's a lot of fragmentation in the firmware of modern computers, and a vulnerability in the UEFI of a motherboard from one manufacturer is not guaranteed to work on products from other vendors or from the same vendor.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Events

Why experience is the new battleground for partners

Join us for an exclusive webinar, in association with Hewlett Packard Enterprise and Technology Services Industry Association (TSIA) and learn about the latest industry insights and how technology services continue to evolve to deliver differentiated value, and how partners can be successful in 2021 and beyond.

Featured

Slideshows

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

More than 500 channel leaders gathered in Auckland on 21 October at the ​Reseller News Innovation Awards ​2020 to celebrate the achievements of the New Zealand technology industry's top partners, start-ups, vendors, distributors and individuals.

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners
Show Comments