Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • PC Hardware
    • Small Business

    DHS Claims Foreign Suppliers Have Embedded Malware in U.S. Electronics

    Written by

    Fahmida Y. Rashid
    Published July 11, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Imported software and consumer electronics are often shipped with purposely embedded malware, according to a Department of Homeland Security official’s Congressional testimony.

      Electronics sold in the United States are being preloaded with spyware, malware and security-compromising components by unknown foreign parties, Greg Schaffer, acting deputy undersecretary of the DHS National Protection and Programs Directorate, testified before the House Oversight and Government Reform Committee July 7.

      There has been some concern about supply-chain security, as computers, portable devices and other electronic devices pass through several suppliers before the final product goes on sale. A federal report released January on the supply chain between the United States and China speculated the possibility that somewhere along the line someone could compromise a component or design a capability that could enable cyber-attacks.

      “These pieces are embedded in software and hardware, and people don’t know that. It’s very difficult to detect,” said Rep. Jason Chaffetz (R-Utah), chairman of the subcommittee, before directly asking Schaffer, “Are you aware of any software or hardware components that have been embedded with security risks?”

      “I am aware of instances where that has happened,” Schaffer said. He did not offer any details on actual components or the type of devices DHS had uncovered with harmful components.

      This is a change from the language in the U.S.-China Economic and Security Review Commission staff report. The possibility of unknown parties maliciously tampering with electronics components has been “largely theoretical,” the report said. Examples included “kill switches” being hidden in machines that would power down the system in response to remote commands.

      Both Homeland Security and the White House have been aware of the threat for quite some time, Schaffer said. It is Homeland Security’s responsibility to identify the technology that makes up the national infrastructure and defend it from cyber-attackers, but it’s “one of the most complicated and difficult challenges” facing the department, Schaffer said. Foreign components can be found in practically every U.S.-manufactured device for both consumer and business use.

      A joint task force by the DHS and the Department of Defense is investigating the problem, according to Schaffer.

      Backdoors aren’t necessarily limited to software applications, as hardware components, such as embedded RFID (radio-frequency identification) chips and Flash memory, could be compromised, according to the testimony.

      However, it would be a challenge to determine whether vulnerabilities found in software and hardware were bugs that were overlooked or were inserted intentionally for malicious purposes. Even malware on hardware is not so clear-cut, as there have been instances of large companies accidentally distributing USB sticks infected with malicious software at conferences, such as IBM’s mistake at AusCERT security conference in May last year. Kaspersky Lab CEO Eugene Kaspersky has spoken about receiving a Flash card at a conference that was infected.

      The White House also released a Cyber Policy Review that said only a small number of these incidents have been uncovered, but the threat was nonetheless real. The White House is interested in offering incentives for private companies to share information with the federal government to help identify and defend against threats.

      “A sophisticated adversary might narrowly focus on particular systems and make manipulation virtually impossible to discover,” the report said.

      The cyber-security session was the first in a series of hearings to examine the “threat to America’s digital infrastructure,” according to a statement by Rep. Darrell Issa (R-Calif.), the committee’s chairman. Issa cited an Office of Management and Budget estimate that cyber-incidents against federal agencies have increased 39 percent in 2010.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×