Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • PC Hardware

    New Russian Malware Can Embed Itself in PC Firmware

    By
    Wayne Rash
    -
    September 28, 2018
    Share
    Facebook
    Twitter
    Linkedin
      FancyBear.hackers

      Researchers at security company ESET say that they have found a new type of malware that embeds itself into a computer’s firmware, where it eludes discovery and from where removal is very difficult. The firmware can withstand all normal methods of discovery, it can’t be removed by anti-malware products, and it will survive the reinstallation of an operating system or even the replacement of the computer’s hard disk.

      Once it’s in the computer, the malware can do pretty much whatever its creators want it to do. It can funnel information to a remote location, it can install ransomware or it can install other types of malware that if they’re removed can simply be installed again by the LoJax malware.

      The malware gets its name from the LoJack anti-theft security software. LoJack, from Absolute Software, also installs itself into the computer’s firmware so that if the computer is stolen, it’s difficult to prevent it from working. With LoJack installed, a stolen computer can report its position back to its owner so that it can be recovered.

      LoJax Tied to Russian Fancy Bear Hacking Group

      The LoJax software, developed by Russian hacking group Fancy Bear, which has been tied to the Russian intelligence organization, works by using a series of tools developed by the Russians that first examine the code running in the victim computer’s UEFI (the uniform extensible firmware interface), to determine if it can be infiltrated. If it can, then the malware loader copies the code, adds its own malware and then flashes the computer’s firmware to embed the code.

      The report from ESET doesn’t say specifically how the LoJax sample managed to infect the computer where it was found, nor does it provide a location beyond saying that it was part of an attack in Africa and Eastern Europe. However, it does provide specific characteristics of the computers that are subject to being attacked and recommendations for avoiding and removing an attack.

      First, the LoJax malware is unable to attack recent versions of computer firmware, meaning that if you keep your firmware updated, you’re unlikely to be a victim. Considering that many computer and system board manufacturers have released firmware updates to help protect against other problems including the recent Spectre and Meltdown vulnerabilities, the firmware in many computers may already be updated.

      Needs Older Chipsets With Vulnerabilities

      Second, the malware requires older chipsets with unpatched vulnerabilities. If you’ve also recently updated your chipset firmware, you may be protected.

      In addition, the malware isn’t signed, which means that if you’re running Secure Boot on your machines, it’ll detect the malware. This is because when SecureBoot runs, it examines the firmware in detail for signs of tampering, and if it finds evidence of tampering, it won’t load the firmware. ESET strongly recommends implementing SecureBoot on all of your systems.

      Once the malware is discovered, the ESET folks have three suggestions about eliminating it. The first is to reflash the firmware. The second is to replace the system board, and the third is to simply replace the computer. As noted earlier, simply installing a new operating system or a new hard drive won’t solve the problem.

      “The other part of firmware security is in the hands of UEFI/BIOS vendors. The security mechanisms provided by the platform need to be properly configured by the system firmware to actually protect it,” the ESET team said in its recommendations. “Thus, firmware must be built with security in mind from the ground up. Fortunately, more and more security researchers are looking at firmware security thus contributing to improve this field and raise awareness of firmware vendors.”

      A Threat to Be Taken Seriously

      Most fairly modern computers are in fact built with security in mind, making the current LoJax malware less of a threat than it might be. But that does not mean that LoJax isn’t a threat to be taken seriously. The creators of the malware may find a way around current firmware security. In addition, there’s no guarantee that all system boards are built with such security.

      Fortunately, one of the concerns put out by the ESET team is less of a problem than it once was. These days, reflashing your firmware isn’t particularly arduous, and it’s mostly automated. The way you accomplish it by visiting the website of your computer or system board manufacturer, downloading the new version of the firmware and then running the self-installer.

      Most such firmware comes in a package that, once downloaded, self-extracts, then runs. When it runs, it sets up the install, it checks the current version of the firmware, and then it starts the flashing process. All you have to do is watch and not turn off the computer. The whole process takes less than 10 minutes.

      On the other hand, the current LoJax malware is only the beginning. Now that the Fancy Bear team knows it can infect computers in the wild, it can attempt to do more. This means that once the Russians figure out how to infect specific computers as needed, the risk grows enormously. And right now, finding this malware—much less fighting it—is also just at the beginning stages.

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×