Connect with us

Published

on

MORE FUN WITH FIRMWARE — Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack UEFIs booting Windows and Linux devices can be hacked by malicious logo images.

Dan Goodin – Dec 6, 2023 3:02 pm UTC EnlargeGetty Images reader comments 195

Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms.

The attackdubbed LogoFAIL by the researchers who devised itis notable for the relative ease in carrying it out, the breadth of both consumer- and enterprise-grade models that are susceptible, and the high level of control it gains over them. In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that cant be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intels Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections. Game over for platform security

LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux. The vulnerabilities are the product of almost a years worth of work by Binarly, a firm that helps customers identify and secure vulnerable firmware.

The vulnerabilities are the subject of a coordinated mass disclosure released Wednesday. The participating companies comprise nearly the entirety of the x64 and ARM CPU ecosystem, starting with UEFI suppliers AMI, Insyde, and Phoenix (sometimes still called IBVs or independent BIOS vendors); device manufacturers such as Lenovo, Dell, and HP; and the makers of the CPUs that go inside the devices, usually Intel, AMD or designers of ARM CPUs. The researchers unveiled the attack on Wednesday at the Black Hat Security Conference in London. Advertisement

The affected parties are releasing advisories that disclose which of their products are vulnerable and where to obtain security patches. Links to advisories and a list of vulnerability designations appears at the end of this article.

As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

Once arbitrary code execution is achieved during the DXE phase, its game over for platform security, researchers from Binarly, the security firm that discovered the vulnerabilities, wrote in a whitepaper. From this stage, we have full control over the memory and the disk of the target device, thus including the operating system that will be started.

From there, LogoFAIL can deliver a second-stage payload that drops an executable onto the hard drive before the main OS has even started. The following video demonstrates a proof-of-concept exploit created by the researchers. The infected devicea Gen 2 Lenovo ThinkCentre M70s running an 11th-Gen Intel Core with a UEFI released in Juneruns standard firmware defenses, including Secure Boot and Intel Boot Guard. LogoFAIL.

In an email, Binarly founder and CEO Alex Matrosov wrote:

LogoFAIL is a newly discovered set of high-impact security vulnerabilities affecting different image parsing libraries used in the system firmware by various vendors during the device boot process. These vulnerabilities are present in most cases inside reference code, impacting not a single vendor but the entire ecosystem across this code and device vendors where it is used. This attack can give a threat actor an advantage in bypassing most endpoint security solutions and delivering a stealth firmware bootkit that will persist in a firmware capsule with a modified logo image. Page: 1 2 3 4 Next → reader comments 195 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Channel Ars Technica ← Previous story Next story → Related Stories Today on Ars

Continue Reading

UK

Eight arrests in connection with two separate terrorism investigations

Published

on

By

Eight arrests in connection with two separate terrorism investigations

Eight men have been arrested by the Metropolitan Police in two unconnected terrorism investigations.

In one operation on Saturday, counter-terror officers arrested five men, four of whom are Iranian nationals. All are in police custody.

The Met said the arrests related to a “suspected plot to target a specific premises”.

In an update shortly after midnight, the force said: “Officers have been in contact with the affected site to make them aware and provide relevant advice and support, but for operational reasons, we are not able to provide further information at this time.”

It added officers were carrying out searches at a number of addresses in the Greater Manchester, London and Swindon areas in connection with the investigation.

It said those detained were:

• A 29-year-old man arrested in the Swindon area
• A 46-year-old man arrested in west London
• A 29-year-old man arrested in the Stockport area
• A 40-year-old man arrested in the Rochdale area
• A man whose age was not confirmed arrested in the Manchester area.

More from UK

Commander Dominic Murphy, head of the Met’s Counter Terrorism Command, said: “This is a fast-moving investigation and we are working closely with those at the affected site to keep them updated.

“The investigation is still in its early stages and we are exploring various lines of enquiry to establish any potential motivation as well as to identify whether there may be any further risk to the public linked to this matter.

“We understand the public may be concerned and as always, I would ask them to remain vigilant and if they see or hear anything that concerns them, then to contact us.

“We are working closely with local officers in the areas where we have made arrests today and I’d like to thank police colleagues around the country for their ongoing support.”

Terror arrests in separate investigation

Police also arrested three further Iranian nationals in London on Saturday as part of another, unrelated counter terror investigation.

The suspects were detained under section 27 of the National Security Act 2023, which allows police to arrest those suspected of being “involved in foreign power threat activity”.

Read more from Sky News:
Pictured: Boy killed in fire – 14 children arrested
Lady Gaga puts on biggest-ever show for free

Home secretary Yvette Cooper said in a statement: “I want to thank the police and our security services for the action they have taken to keep our country safe.

“Protecting national security is the first duty of government and our police and security services have our strong support in their vital work.”

She added: “These are serious events that demonstrate the ongoing requirement to adapt our response to national security threats.”

Continue Reading

Politics

Pro-crypto Democrats pull support for stablecoin bill in last minute

Published

on

By

Pro-crypto Democrats pull support for stablecoin bill in last minute

Pro-crypto Democrats pull support for stablecoin bill in last minute

A group of US Senate Democrats known for supporting the crypto industry have said they would oppose a Republican-led stablecoin bill if it moves forward in its current form.

The move threatens to stall legislation that could establish the first US regulatory framework for stablecoins, according to a May 3 report from Politico.

Per the report, nine Senate Democrats said in a joint statement that the bill “still has numerous issues that must be addressed.” They warned they would not support a procedural vote to advance the legislation unless changes are made.

Among the signatories were Senators Ruben Gallego, Mark Warner, Lisa Blunt Rochester and Andy Kim — all of whom had previously backed the bill when it passed through the Senate Banking Committee in March.

The bill, introduced by Senator Bill Hagerty, is formally known as the Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act.

Related: Fed’s Powell reasserts support for stablecoin legislation

Senate prepares to vote on stablecoin bill

The Senate is expected to begin floor consideration of the bill in the coming days, with the first vote potentially taking place next week.

The bill has been championed by the crypto industry as a landmark step toward regulatory clarity. However, the Democrats’ about-face reflects growing unease within the party.

Although revisions were made to the bill after its committee approval to address Democratic concerns, the lawmakers said the changes fell short. They called for stronger safeguards related to Anti-Money Laundering, national security, foreign issuers, and accountability measures for noncompliant actors.

The statement was also signed by Senators Raphael Warnock, Catherine Cortez Masto, Ben Ray Luján, John Hickenlooper and Adam Schiff.

Pro-crypto Democrats pull support for stablecoin bill in last minute
A copy of the statement. Source: Alex Thorn

Senator Kirsten Gillibrand and Senator Angela Alsobrooks were absent from the list, who co-sponsored the bill alongside Hagerty.

Despite their objections, the Democratic senators emphasized their commitment to shaping responsible crypto regulation. They reportedly said they “are eager to continue working with our colleagues to address these issues.”

Related: US banks are ‘free to begin supporting Bitcoin’

Crypto needs a stablecoin bill

On April 27, Caitlin Long, founder and CEO of Custodia Bank, criticized the US Federal Reserve for quietly maintaining a key anti-crypto policy that favors big-bank-issued stablecoins, despite relaxing crypto partnership rules for banks.

Long explained that while the Fed recently rescinded four prior crypto guidelines, a Jan. 27, 2023, statement was left intact in coordination with the Biden administration.

The guidance, according to Long, blocks banks from engaging directly with crypto assets and prohibits them from issuing stablecoins on permissionless blockchains.

However, Long noted that once a federal stablecoin bill becomes law, it could override the Fed’s stance. “Congress should hurry up,” she urged.

Magazine: Financial nihilism in crypto is over — It’s time to dream big again

Continue Reading

UK

Pictured: Boy killed in Gateshead industrial estate fire – 14 children arrested on suspicion of manslaughter

Published

on

By

Pictured: Boy killed in Gateshead industrial estate fire - 14 children arrested on suspicion of manslaughter

Tributes have been paid to 14-year-old Layton Carr who died in a fire at an industrial estate.

Eleven boys and three girls, aged between 11 and 14 years, have been arrested on suspicion of manslaughter after the incident in Gateshead on Friday. They remain in police custody.

Drone view showing the aftermath of a fire at Fairfield industrial park at Bill Quay, Gateshead
Image:
Police were alerted to a fire at Fairfield industrial park in the Bill Quay area

Firefighters raced to Fairfield industrial park in the Bill Quay area shortly after 8pm, putting out the blaze a short time later.

Police then issued an appeal for a missing boy, Layton Carr, who was believed to be in the area at the time.

In a statement, the force said that “sadly, following searches, a body believed to be that of 14-year-old Layton Carr was located deceased inside the building”.

Layton’s next of kin have been informed and are being supported by specialist officers, police added.

Pic: North News and Pictures
Image:
Layton has been described as a ‘beautiful soul’

A fundraising page on GoFundMe has been set up to help Layton’s mother pay for funeral costs.

Organiser Stephanie Simpson said: “The last thing Georgia needs to stress trying to pay for a funeral for her Boy Any donations will help thank you.”

One tribute in a Facebook post read: “Can’t believe I’m writing this my nephew RIP Layton 💔 forever 14 you’ll be a massive miss, thinking of my sister and 2 beautiful nieces right now.”

Another added: “My boy ❤️ my baby cousin, my Layton. Nothing will ever come close to the pain I feel right now. Forever 14. I’ll miss you sausage.”

A third said: “Rest in peace big lad such a beautiful soul taken far to soon my thoughts are with you Gee stay strong girl hear for u always.”

Read more from Sky News:
Eight arrests in connection with two terrorism operations
Compensation scheme scrapped for child sexual abuse victims

Detective Chief Inspector Louise Jenkins, of Northumbria Police, also said: “This is an extremely tragic incident where a boy has sadly lost his life.”

She added that the force’s “thoughts are with Layton’s family as they begin to attempt to process the loss of their loved one”.

They are working to establish “the full circumstances surrounding the incident” and officers will be in the area to “offer reassurance to the public”, she added.

A cordon remains in place at the site while police carry out enquiries.

Continue Reading

Trending