AGL 40.01 Decreased By ▼ -0.02 (-0.05%)
AIRLINK 128.00 Increased By ▲ 0.30 (0.23%)
BOP 6.70 Increased By ▲ 0.09 (1.36%)
CNERGY 4.50 Decreased By ▼ -0.10 (-2.17%)
DCL 9.02 Increased By ▲ 0.23 (2.62%)
DFML 41.65 Increased By ▲ 0.07 (0.17%)
DGKC 88.00 Increased By ▲ 2.21 (2.58%)
FCCL 32.70 Increased By ▲ 0.21 (0.65%)
FFBL 64.60 Increased By ▲ 0.57 (0.89%)
FFL 11.61 Increased By ▲ 1.06 (10.05%)
HUBC 111.40 Increased By ▲ 0.63 (0.57%)
HUMNL 14.85 Decreased By ▼ -0.22 (-1.46%)
KEL 5.05 Increased By ▲ 0.17 (3.48%)
KOSM 7.40 Decreased By ▼ -0.05 (-0.67%)
MLCF 41.20 Increased By ▲ 0.68 (1.68%)
NBP 61.30 Increased By ▲ 0.25 (0.41%)
OGDC 195.48 Increased By ▲ 0.61 (0.31%)
PAEL 27.54 Increased By ▲ 0.03 (0.11%)
PIBTL 7.77 Decreased By ▼ -0.04 (-0.51%)
PPL 152.75 Increased By ▲ 0.22 (0.14%)
PRL 26.61 Increased By ▲ 0.03 (0.11%)
PTC 16.15 Decreased By ▼ -0.11 (-0.68%)
SEARL 84.22 Increased By ▲ 0.08 (0.1%)
TELE 7.94 Decreased By ▼ -0.02 (-0.25%)
TOMCL 36.69 Increased By ▲ 0.09 (0.25%)
TPLP 8.85 Increased By ▲ 0.19 (2.19%)
TREET 17.04 Decreased By ▼ -0.62 (-3.51%)
TRG 57.47 Decreased By ▼ -1.15 (-1.96%)
UNITY 27.00 Increased By ▲ 0.14 (0.52%)
WTL 1.34 Decreased By ▼ -0.04 (-2.9%)
BR100 10,000 No Change 0 (0%)
BR30 31,002 No Change 0 (0%)
KSE100 94,679 Increased By 487.2 (0.52%)
KSE30 29,418 Increased By 216.5 (0.74%)

A multi-year effort to prevent hackers from altering computers while they boot up has largely failed because of lax application of preventive steps, researchers say, despite disclosures that flaws are being exploited. In the latest sign that the problem persists, researchers at the federally funded MITRE lab said this week that many customers of Intel Corp still had not adopted revised security designs Intel distributed in March after the MITRE team found new vulnerabilities in the start-up process.
That could mean many newer Windows computers remain exposed, the MITRE team told Reuters ahead of a presentation at the Black Hat security conference in Las Vegas next week. Intel's point person on the issue, Bruce Monroe, said he did not know how many suppliers and computer makers had followed Intel's recommendations.
"We're not privy to whether they've fixed it or not," Monroe said. "We asked them to let us know." The stubborn glitches illustrates how such well-funded spying programs as those exposed by former National Security Agency contractor Edward Snowden can continue to succeed against targets that depend on a complex supply chain.
Long before Snowden's documents began appearing the media, professional technicians and US officials were concerned about the vulnerabilities that left computers severely exposed as they are turned on. Years ago, then-US National Security Agency Director Keith Alexander privately urged the chief executives of major American technology companies to do something about the boot-up procedure known as the Basic Input/Output System, or BIOS. BIOS relies on firmware, or permanent software that ships with computers.
Because the start-up code is given more authority than the operating system, hackers who break into that code can make major changes to programs and hide evidence of their presence. Lodging there also all but guarantees what the security industry calls persistence - the ability to remain inside even after a computer is turned off and rebooted. Intel, Microsoft Corp and other companies promoted a successor system known as the Unified Extensible Firmware Interface that includes a feature called "secure boot," which checks for digital signatures before running code. Microsoft's Windows 8 operating system has embraced UEFI and secure boot, bringing the hardened approach to more than 60 million new computers.
Even as that rollout was accelerating, though, evidence accumulated that attacks similar to those theorised by researchers were actually under way. In 2011, several research firms identified one such piece of malicious software, called Mebromi, that primarily attacked Chinese computers with a type of BIOS from leading supplier Phoenix Technologies Ltd.
Early last year, Reuters saw a catalogue from a US defense contractor that included a product, offered at more than $100,000, for incapacitating target computers by attacking BIOS and other critical elements. And in December, Der Spiegel reported that a leaked internal NSA catalogue described a tool called DeityBounce that attacked the BIOS of Dell Inc servers. That came months after a presentation at last year's Black Hat security conference in which MITRE researchers including Corey Kallenberg and Xeno Kovah broke into Dell's boot-up process.

Copyright Reuters, 2014

Comments

Comments are closed.