Top 5 This Week

Related Posts

HP Wolf: Not just software attacks; hackers are coming for enterprise hardware, too


Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


Todayโ€™s enterprises are software-focused and software-driven, meaning that much of the emphasis of cybersecurity is on software, too.ย 

But the hardware on which that software runs can be just as enticing to attackers. In fact, threat actors are increasingly targeting physical supply chains and tampering with device hardware and firmware integrity, drawing alarm from enterprise leaders, according to a new report from HP Wolf Security.

Notably, one in five businesses have been impacted by attacks on hardware supply chains, and an alarming 91% of IT and security decision makers believe that nation-state threat actors will target physical PCs, laptops, printers and other devices.ย 

โ€œIf an attacker compromises a device at the firmware or hardware layer, theyโ€™ll gain unparalleled visibility and control over everything that happens on that machine,โ€ said Alex Holland, principal threat researcher at HP Security Lab. โ€œJust imagine what that could look like if it happens to the CEOโ€™s laptop.โ€

โ€˜Blind and unequippedโ€™

HP Wolf released the preliminary details of its ongoing research into physical platform security โ€” based on a survey of 800 IT and security decision-makers โ€” ahead of leading cybersecurity conference Black Hat this week.ย 

Among the findings:ย 

  • Nearly one in five (19%) organizations have been impacted by nation-state actors targeting physical PC, laptop or printer supply chains.
  • More than half (51%) of respondents arenโ€™t able to verify whether or not PCs, laptops or printer hardware and firmware have been tampered with while in the factory or in transit.
  • Roughly one-third (35%) believe that they or others they know have been impacted by nation-state actors attempting to insert malicious hardware or firmware into devices.
  • 63% think the next major nation-state attack will involve poisoning hardware supply chains to sneak in malware.
  • 78% say the attention on software and hardware supply chain security will grow as attackers try to infect devices in the factory or in transit.ย 
  • 77% report that they need a way to verify hardware integrity to mitigate device tampering during delivery.

โ€œOrganizations feel blind and unequipped,โ€ said Holland. โ€œThey donโ€™t have the visibility and capability to be able to detect whether theyโ€™ve been tampered with.โ€

Denial of availability, device tampering

There are many ways attackers can disrupt the hardware supply chain โ€” the first being denial of availability, Holland explained. In this scenario, threat actors will launch ransomware campaigns against a factory to prevent devices from being assembled and delay delivery, which can have damaging ripple effects.ย 

In other instances, threat actors will infiltrate factory infrastructure to target specific devices and modify hardware components, thus weakening firmware configurations. For instance, they may turn off security features. Devices are also intercepted while in transit, say at shipping ports and other intermediary locations.

โ€œA lot of leaders are increasingly concerned about the risk of device tampering,โ€ said Holland. โ€œThis speaks to this blind spot: Youโ€™ve ordered something from the factory but canโ€™t tell whether it was built as intended.โ€

Firmware and hardware attacks are particularly challenging because they sit below the operating system โ€” whereas most security tools sit within operating systems (such as Windows), Holland explained.ย 

โ€œIf an attacker is able to compromise firmware, itโ€™s really difficult to detect using standard security tools,โ€ said Holland. โ€œIt poses a real challenge for IT security teams to be able to detect low-level threats against hardware and firmware.โ€

Further, firmware vulnerabilities are notoriously difficult to fix. With modern PCs, for instance, firmware is stored on a separate flash storage on a motherboard, not on the drive, Holland explained. This means that inserted malware rests in firmware memory in a separate chip.ย 

So, IT teams canโ€™t simply re-image a machine or replace a hard drive to remove infection, Holland noted. They have to manually intervene, reflashing the compromised firmware with a known good copy, which is โ€œcumbersome to do.โ€ย 

โ€œItโ€™s difficult to detect, difficult to remediate,โ€ said Holland. โ€œVisibility is poor.โ€

Still with the password problem?

Password hygiene is one of those things hammered into all of our heads these days โ€” but apparently itโ€™s still messy when it comes to setting up hardware.ย 

โ€œThereโ€™s really bad password hygiene around managing firmware configurations,โ€ said Holland. โ€œItโ€™s one of the few areas of IT where itโ€™s still widespread.โ€ย 

Often, organizations donโ€™t set a password to change settings, or they use weak passwords or the same passwords across different systems. As with any other scenario, no password means anyone can get in and tamper; weak passwords can be easily guessed, and with identical passwords, โ€œan attacker only needs to compromise one device and can access the settings of all devices,โ€ Holland pointed out.

Passwords in firmware configuration are historically difficult to manage, Holland explained, because admins have to go into every device and record all passwords. One common workaround is to store passwords in Excel spreadsheets; in other instances, admins will set the password as the serial number of the device.ย 

โ€œPassword-based mechanisms controlling access to firmware are not well done,โ€ said Holland, calling hardware config management the โ€œlast frontierโ€ of password hygiene.ย 

Strong supply chain security: Strong organization security

There are measures organizations can take, of course, to protect their important hardware. One tool in the arsenal is a platform certificate, Holland explained. This is generated on a device during assembly, and upon delivery, allows users to verify that it has been built as intended and that โ€œits integrity is in check.โ€

Meanwhile, tools such as HP Sure Admin use public key cryptography to enable access to firmware configurations. โ€œIt removes the need for passwords entirely, which is a big win for organizations,โ€ said Holland.ย 

Similarly, HP Tamper Lock helps prevent physical tampering, relying on built-in sensors that are tripped when a chassis or other component is removed. โ€œThe system goes into a secure lockdown state,โ€ Holland explained, so hackers arenโ€™t able to boot into the operating system or sniff out credentials.ย 

Such physical attacks โ€” when hackers essentially break into a computer โ€” arenโ€™t all that widespread, Holland pointed out. However, he outlined the scenario of a VIP or exec onsite at an event โ€” all it takes is them turning away from their device for a moment or two for an attacker to pounce.ย 

Ultimately, โ€œorganizational security depends on strong supply chain security,โ€ Holland emphasized. โ€œYou need to know whatโ€™s in devices and how theyโ€™ve been built, that they havenโ€™t been tampered with so you can trust them.โ€

#Wolf #software #attacks #hackers #coming #enterprise #hardware
source: https://venturebeat.com/security/hp-wolf-not-just-software-attacks-hackers-are-coming-for-enterprise-hardware-too/

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Popular Articles