Risk
8/24/2012
11:51 AM
Connect Directly
RSS
E-Mail
50%
50%

Safer Boots: Feds Urge Malware-Resistant BIOS

NIST advises PC and server makers strengthen the security of BIOS ROM chip flashware. Attacks against BIOS can be used to create persistent rootkits that survive reboots.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Memo to manufacturers: Improve the security of the BIOS ROM chip flashware running on PCs and servers.

That's the gist of a recently released draft report from the National Institute of Standards and Technology (NIST), which offers advice on how manufacturers can better protect the BIOS flashware used on servers. NIST currently is soliciting comments on the draft report, which can be filed with the agency until Sept. 14, 2012.

Why worry about the BIOS? "Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS's unique and privileged position within the PC architecture. Malicious BIOS modification could be part of a sophisticated, targeted attack on an organization--either a permanent denial of service or a persistent malware presence," says the report.

Previous examples of BIOS-infecting malware are relatively rare, but include the Windows-targeting CIH or Chernobyl virus, which appeared in 1998 and could flash a BIOS and corrupt it, after erasing the data on a PC.

[ Leave hacker payback to the experts: Strike Back At Hackers? Get A Lawyer. ]

But worries over BIOS security have been growing, especially since researchers in 2009 demonstrated a technique for injecting code into any unsigned firmware. Last year, security researchers discovered a BIOS-altering rootkit called Mebromi, which can alter boot-time instructions in the BIOS, which in turn alter the computer's master boot record (MBR). When the PC powers on, firmware in the BIOS ROM loads and executes the MBR, which is the sector at the very beginning of a hard drive, and thus the first to load.

Infecting the BIOS and MBR makes it difficult for antivirus software to find or eradicate the malware, raising the possibility that attackers could create boot-proof and antivirus-resistant rootkits.

"Developing an antivirus utility able to clean the BIOS code is a challenge, because it needs to be totally error-proof, to avoid rendering the system unbootable at all," said Webroot security researcher Marco Giuliani last year, in his analysis of Mebroni. In fact, even small coding errors made when trying to repair a BIOS could brick the machine. On the upside, however, in the case of Mebroni, the malware could only infect PCs with a BIOS ROM made by Award, which is part of Phoenix.

As Mebroni demonstrates, servers aren't the only systems at risk from a BIOS attack. Last year, NIST released "BIOS Protection Guidelines" for PC manufacturers, to help them prevent unwanted BIOS modification on PCs by attackers.

The report warned that BIOS implementations could become more susceptible to such attacks in the future. "The move from conventional BIOS implementations to implementations based on the Unified Extensible Firmware Interface (UEFI) may make it easier for malware to target the BIOS in a widespread fashion, as these BIOS implementations are based on a common specification," it said, meaning that attackers could potentially hit more targets at once with a single piece of malware.

Accordingly, NIST recommends that manufacturers begin cryptographically signing their BIOS updates, and treating the BIOS as an essential part of PC security. "By building security into the firmware, you establish the foundation for a secure system," report co-author Andrew Regenscheid told ScienceDaily.

Mobile employees' data and apps need protecting. Here are 10 ways to get the job done. Also in the new, all-digital 10 Steps To E-Commerce Security special issue of Dark Reading: Mobile technology is forcing businesses to rethink the fundamentals of how their networks work. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4884
Published: 2014-10-21
The Conrad Hotel (aka com.wConradHotel) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4885
Published: 2014-10-21
The CPWORLD Close Protection World (aka com.tapatalk.closeprotectionworldcom) application 3.4.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4887
Published: 2014-10-21
The Joint Radio Blues (aka com.nobexinc.wls_69685189.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4888
Published: 2014-10-21
The BattleFriends at Sea GOLD (aka com.tequilamobile.warshipslivegold) application 1.1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4889
Published: 2014-10-21
The Diabetic Diet Guide (aka com.wDiabeticDietGuide) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.