AGL 40.00 No Change ▼ 0.00 (0%)
AIRLINK 127.04 No Change ▼ 0.00 (0%)
BOP 6.67 No Change ▼ 0.00 (0%)
CNERGY 4.51 No Change ▼ 0.00 (0%)
DCL 8.55 No Change ▼ 0.00 (0%)
DFML 41.44 No Change ▼ 0.00 (0%)
DGKC 86.85 No Change ▼ 0.00 (0%)
FCCL 32.28 No Change ▼ 0.00 (0%)
FFBL 64.80 No Change ▼ 0.00 (0%)
FFL 10.25 No Change ▼ 0.00 (0%)
HUBC 109.57 No Change ▼ 0.00 (0%)
HUMNL 14.68 No Change ▼ 0.00 (0%)
KEL 5.05 No Change ▼ 0.00 (0%)
KOSM 7.46 No Change ▼ 0.00 (0%)
MLCF 41.38 No Change ▼ 0.00 (0%)
NBP 60.41 No Change ▼ 0.00 (0%)
OGDC 190.10 No Change ▼ 0.00 (0%)
PAEL 27.83 No Change ▼ 0.00 (0%)
PIBTL 7.83 No Change ▼ 0.00 (0%)
PPL 150.06 No Change ▼ 0.00 (0%)
PRL 26.88 No Change ▼ 0.00 (0%)
PTC 16.07 No Change ▼ 0.00 (0%)
SEARL 86.00 No Change ▼ 0.00 (0%)
TELE 7.71 No Change ▼ 0.00 (0%)
TOMCL 35.41 No Change ▼ 0.00 (0%)
TPLP 8.12 No Change ▼ 0.00 (0%)
TREET 16.41 No Change ▼ 0.00 (0%)
TRG 53.29 No Change ▼ 0.00 (0%)
UNITY 26.16 No Change ▼ 0.00 (0%)
WTL 1.26 No Change ▼ 0.00 (0%)
BR100 10,010 Increased By 126.5 (1.28%)
BR30 31,023 Increased By 422.5 (1.38%)
KSE100 94,192 Increased By 836.5 (0.9%)
KSE30 29,201 Increased By 270.2 (0.93%)

A new security flaw has been found in Intel hardware which could enable hackers to access corporate laptops remotely, Finnish cybersecurity specialist F-Secure said on Friday. F-Secure said in a statement that the flaw had nothing to do with the "Spectre" and "Meltdown" vulnerabilities recently found in the micro-chips that are used in almost all computers, tablets and smartphones today.
Rather, it was an issue within Intel Active Management Technology (AMT), "which is commonly found in most corporate laptops, (and) allows an attacker to take complete control over a user's device in a matter of seconds," the cybersecurity firm said. "The issue potentially affects millions of laptops globally."
The flaw was of "an almost shocking simplicity, but its destructive potential is unbelievable," said F-Secure consultant Harry Sintonen, who discovered it. "In practice, this flaw could give a hacker complete control over the affected laptop, despite the best security measures." An attacker would initially need physical access to the device in question.
But once they had re-configured AMT, they could effectively "backdoor" the machine and then access the device remotely, by connecting to the same wireless or wired network as the user, F-Secure said. In certain cases, the assailant could also programme AMT to connect to their own server, which would eliminate the need to be in the same network segment as the victim.
"No other security measures - full disk encryption, local firewall, anti-malware software or VPN - are able to prevent exploitation of this issue." A successful attack would lead to complete loss of confidentiality, integrity and availability, F-Secure said.
The assailant would be able to read and modify all of the data and applications a user may have access to on their computer. And they could also install malware on the device, even at the firmware level. F-Secure expert Sintonen said that organizations needed set a strong AMT password or perhaps disable AMT completely if possible.

Copyright Agence France-Presse, 2018

Comments

Comments are closed.