Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

The steady state of disks is full. -- Ken Thompson


computers / alt.comp.os.windows-10 / Does your PC’s motherboard have hidden vulnerability that could put you at risk?

SubjectAuthor
* Does your PC’s motherboard have hiddenJohnny
+* _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
|+* Does your PC’s motherboard have hiddenJohnny
||+- _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
||`- Does your PC?s motherboard have hidden vulnerability that could put you at risStan Brown
|+* _Does_your_PC’s_motherboard_have_hidden_vulnerPaul
||`* _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
|| +* Does your PC’s_motherboard_have_hiddenVanguardLH
|| |+- _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
|| |`- _Does_your_PC’s_motherboard_have_hidden_vulnSam E
|| `- _Does_your_PC’s_motherboard_have_hidden_vulnAndy Burns
|`- _Does_your_PC’s_motherboard_have_hidden_vulnAndy Burns
+* Does your PC’s_motherboard_have_hiddenVanguardLH
|+- Does your PC’s_motherboard_have_hiddenVanguardLH
|`* _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
| `- Does your PC’s_motherboard_have_hiddenVanguardLH
`* _Does_your_PC’s_motherboard_have_hidden_vulnJeff Barnett
 `* _Does_your_PC’s_motherboard_have_hidden_vulnCarlos E.R.
  `- _Does_your_PC’s_motherboard_have_hidden_vulnerPaul

1
Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<20230611141837.5ca0d14e@mx>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72289&group=alt.comp.os.windows-10#72289

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: johnny@invalid.net (Johnny)
Newsgroups: alt.comp.os.windows-10
Subject: Does your PC’s motherboard have hidden
vulnerability that could put you at risk?
Date: Sun, 11 Jun 2023 14:18:37 -0500
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <20230611141837.5ca0d14e@mx>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="898831ceda397d42a38062f6f5c30829";
logging-data="2938506"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/NrmVDBoriDe1vkuchkUqR"
Cancel-Lock: sha1:B1uvheCkQe70V1ZXrZv9FGlmxZ0=
X-Newsreader: Claws Mail 4.0.0 (GTK+ 3.24.24; x86_64-pc-linux-gnu)
 by: Johnny - Sun, 11 Jun 2023 19:18 UTC

Published June 11, 2023

A cybersecurity company called Eclypsium has made a startling
discovery. They found a hidden backdoor in the firmware of motherboards
(the main circuit board in a computer) made by a Taiwanese company
called Gigabyte, and this backdoor makes the motherboards easily
accessible for hackers to break into.

Gigabyte apparently integrated a Windows executable file into the
firmware of its motherboards. This file is executed when the computer
starts up, meaning that each time you restart your computer, the
firmware's code activates Gigabyte's app center. This app center then
proceeds to download and run a file from the internet.

Continued:

https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<1jjhljxpek.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72290&group=alt.comp.os.windows-10#72290

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 21:23:45 +0200
Lines: 30
Message-ID: <1jjhljxpek.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 7r+N0f2UwO0wFEj0aBxOKgP0P1ako9ORJ3UJo2ycOhkkK/w+VT
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:7yWkercI5WSNvYYj8FsIrgwSOO8=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <20230611141837.5ca0d14e@mx>
 by: Carlos E.R. - Sun, 11 Jun 2023 19:23 UTC

On 2023-06-11 21:18, Johnny wrote:
>
> Published June 11, 2023
>
> A cybersecurity company called Eclypsium has made a startling
> discovery. They found a hidden backdoor in the firmware of motherboards
> (the main circuit board in a computer) made by a Taiwanese company
> called Gigabyte, and this backdoor makes the motherboards easily
> accessible for hackers to break into.
>
> Gigabyte apparently integrated a Windows executable file into the
> firmware of its motherboards. This file is executed when the computer
> starts up, meaning that each time you restart your computer, the
> firmware's code activates Gigabyte's app center. This app center then
> proceeds to download and run a file from the internet.

I'd appreciate some technical language, instead of layman first grader
speak.

What you posted is impossible to decipher.

>
> Continued:
>
> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
>

--
Cheers, Carlos.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<20230611145954.38674dc2@mx>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72291&group=alt.comp.os.windows-10#72291

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: johnny@invalid.net (Johnny)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC’s motherboard have hidden
vulnerability that could put you at risk?
Date: Sun, 11 Jun 2023 14:59:54 -0500
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <20230611145954.38674dc2@mx>
References: <20230611141837.5ca0d14e@mx>
<1jjhljxpek.ln2@Telcontar.valinor>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="898831ceda397d42a38062f6f5c30829";
logging-data="2948404"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+avh8p3XaCzRhCRdNsABod"
Cancel-Lock: sha1:eQZ5ykf00ShNN9cDUE6Tyr1q1yE=
X-Newsreader: Claws Mail 4.0.0 (GTK+ 3.24.24; x86_64-pc-linux-gnu)
 by: Johnny - Sun, 11 Jun 2023 19:59 UTC

On Sun, 11 Jun 2023 21:23:45 +0200
"Carlos E.R." <robin_listas@es.invalid> wrote:

> On 2023-06-11 21:18, Johnny wrote:
> >
> > Published June 11, 2023
> >
> > A cybersecurity company called Eclypsium has made a startling
> > discovery. They found a hidden backdoor in the firmware of
> > motherboards (the main circuit board in a computer) made by a
> > Taiwanese company called Gigabyte, and this backdoor makes the
> > motherboards easily accessible for hackers to break into.
> >
> > Gigabyte apparently integrated a Windows executable file into the
> > firmware of its motherboards. This file is executed when the
> > computer starts up, meaning that each time you restart your
> > computer, the firmware's code activates Gigabyte's app center. This
> > app center then proceeds to download and run a file from the
> > internet.
>
> I'd appreciate some technical language, instead of layman first
> grader speak.
>
> What you posted is impossible to decipher.
>
> >
> > Continued:
> >
> > https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
> >
>

Have it translated to Spanish. Maybe that will help.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<u659a7$2q0m0$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72292&group=alt.comp.os.windows-10#72292

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vulner
ability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 16:03:18 -0400
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <u659a7$2q0m0$1@dont-email.me>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 11 Jun 2023 20:03:19 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="2b0e3a86205524d851cc88044ebd4c3b";
logging-data="2949824"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19rc5OOj5iTs9JUdBqExczblb3h8EgtfxY="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:OaouEfo9yj/WdcIUxP0mvH3yl7Q=
In-Reply-To: <1jjhljxpek.ln2@Telcontar.valinor>
Content-Language: en-US
 by: Paul - Sun, 11 Jun 2023 20:03 UTC

On 6/11/2023 3:23 PM, Carlos E.R. wrote:
> On 2023-06-11 21:18, Johnny wrote:
>>
>> Published June 11, 2023
>>
>> A cybersecurity company called Eclypsium has made a startling
>> discovery. They found a hidden backdoor in the firmware of motherboards
>> (the main circuit board in a computer) made by a Taiwanese company
>> called Gigabyte, and this backdoor makes the motherboards easily
>> accessible for hackers to break into.
>>
>> Gigabyte apparently integrated a Windows executable file into the
>> firmware of its motherboards. This file is executed when the computer
>> starts up, meaning that each time you restart your computer, the
>> firmware's code activates Gigabyte's app center. This app center then
>> proceeds to download and run a file from the internet.
>
> I'd appreciate some technical language, instead of layman first grader speak.
>
> What you posted is impossible to decipher.
>
>>
>> Continued:
>>
>> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk

https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/

"Our follow-up analysis discovered that firmware in Gigabyte systems is
dropping and executing a Windows native executable during the system
startup process, and this executable then downloads and executes
additional payloads insecurely. It uses the same techniques as other
OEM backdoor-like features like Computrace backdoor (a.k.a. LoJack DoubleAgent)
abused by threat actors and even firmware implants such as Sednit LoJax,
MosaicRegressor, Vector-EDK. Subsequent analysis showed that this same code
is present in hundreds of models of Gigabyte PCs. We are working with
Gigabyte to address this insecure implementation of their app center capability."

Here is an example of a Computrace dropper (attack from BIOS). Computrace
would be popular in laptop design. Computrace got right to the point, mounted
the file system and overwrote autochk.exe :-)

https://www.blackhat.com/docs/us-14/materials/us-14-Kamluk-Computrace-Backdoor-Revisited-WP.pdf

By flash-updating the BIOS, as long as the structures and code are
removed, there will be no "new occurrences". But you would not know
whether a persistent threat had been put onboard or not. It would depend
on what the dropper did to gain a foothold.

Paul

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<auohljxr3c.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72293&group=alt.comp.os.windows-10#72293

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.neodome.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 22:55:06 +0200
Lines: 40
Message-ID: <auohljxr3c.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
<20230611145954.38674dc2@mx>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Ipiyg7j4+t8CoeUxG3YGsgj5xLGDB66pAJDmPxoEbxd+edNvSG
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:Ny6ha6bRfS5m/Q8kTO2Pkhm9ENg=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <20230611145954.38674dc2@mx>
 by: Carlos E.R. - Sun, 11 Jun 2023 20:55 UTC

On 2023-06-11 21:59, Johnny wrote:
> On Sun, 11 Jun 2023 21:23:45 +0200
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>> On 2023-06-11 21:18, Johnny wrote:
>>>
>>> Published June 11, 2023
>>>
>>> A cybersecurity company called Eclypsium has made a startling
>>> discovery. They found a hidden backdoor in the firmware of
>>> motherboards (the main circuit board in a computer) made by a
>>> Taiwanese company called Gigabyte, and this backdoor makes the
>>> motherboards easily accessible for hackers to break into.
>>>
>>> Gigabyte apparently integrated a Windows executable file into the
>>> firmware of its motherboards. This file is executed when the
>>> computer starts up, meaning that each time you restart your
>>> computer, the firmware's code activates Gigabyte's app center. This
>>> app center then proceeds to download and run a file from the
>>> internet.
>>
>> I'd appreciate some technical language, instead of layman first
>> grader speak.
>>
>> What you posted is impossible to decipher.
>>
>>>
>>> Continued:
>>>
>>> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
>>>
>>
>
> Have it translated to Spanish. Maybe that will help.

Why would I? That's a dumb idea.

--
Cheers, Carlos.

Re: Does your PC?s motherboard have hidden vulnerability that could put you at risk?

<MPG.3eefd55d134f9f08990138@news.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72294&group=alt.comp.os.windows-10#72294

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: the_stan_brown@fastmail.fm (Stan Brown)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC?s motherboard have hidden vulnerability that could put you at risk?
Date: Sun, 11 Jun 2023 13:58:39 -0700
Organization: Oak Road Systems
Lines: 17
Message-ID: <MPG.3eefd55d134f9f08990138@news.individual.net>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor> <20230611145954.38674dc2@mx>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Uqp6K5lqqx2HQWFe1Oyx1AzD41G9dOopzvRnT1wc2PNZV8nWSY
Cancel-Lock: sha1:G3RU2KbwQfizQ9w4kIeBc72NDSI=
User-Agent: MicroPlanet-Gravity/3.0.11 (GRC)
 by: Stan Brown - Sun, 11 Jun 2023 20:58 UTC

On Sun, 11 Jun 2023 14:59:54 -0500, Johnny wrote:
>
> On Sun, 11 Jun 2023 21:23:45 +0200
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
> > I'd appreciate some technical language, instead of layman first
> > grader speak.
> >
> > What you posted is impossible to decipher.

> Have it translated to Spanish. Maybe that will help.

Racism? Really?

--
Stan Brown, Tehachapi, California, USA https://BrownMath.com/
Shikata ga nai...

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<z8u3k4elb9zy.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72295&group=alt.comp.os.windows-10#72295

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC’s_motherboard_have_hidden
_vulnerability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 16:02:14 -0500
Organization: Usenet Elder
Lines: 115
Sender: V@nguard.LH
Message-ID: <z8u3k4elb9zy.dlg@v.nguard.lh>
References: <20230611141837.5ca0d14e@mx>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 3Ap5ZKQk2MJhqyhAhCPhOwvfnwBpq1zvCdvIkstbDqPMTV2tv8
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:sxWG96fRoKHN8vW0pSY9fsa20WE=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Sun, 11 Jun 2023 21:02 UTC

Johnny <johnny@invalid.net> wrote:

> Published June 11, 2023
>
> A cybersecurity company called Eclypsium has made a startling
> discovery. They found a hidden backdoor in the firmware of motherboards
> (the main circuit board in a computer) made by a Taiwanese company
> called Gigabyte, and this backdoor makes the motherboards easily
> accessible for hackers to break into.
>
> Gigabyte apparently integrated a Windows executable file into the
> firmware of its motherboards. This file is executed when the computer
> starts up, meaning that each time you restart your computer, the
> firmware's code activates Gigabyte's app center. This app center then
> proceeds to download and run a file from the internet.
>
> Continued:
>
> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk

A Windows executable file. That means the OS has to be available to
support running a Win32 executable. Well, if Windows gets loaded by the
BIOS then what's the point of later re-loading it after the POST screen?
More likely its an ASM executable (machine code). Also, this program is
used to update the firmware (BIOS/UEFI) of the mobo. Why would you let
anyone change the brains of your computer? That is major surgery.
*YOU* decide when you have prepared for a firmware update before doing
it. Maybe it's safe in presenting a prompt/GUI asking for your
permission to perform the firmware update, but that would be a nuisance
on a perfectly functioning computer in nagging you to update when likely
the new firmware version will give you nothing. *YOU* are supposed to
investigate what a new firmware version gives you before applying it.
If your BIOS has a firmware-based option to auto-update the firmware,
*TURN IT OFF*.

Many mobos give you software (that runs under an OS, not machine code to
run raw) to check for firmware and ancilliary software updates, but you
have to run them. They don't load automatically during the boot
process. They load by you after the OS has loaded. I have an Asrock
mobo whose BIOS has no setting to disable WPBT, but they provide
user-loaded software to run after Windows boots to do firmware updating.
The *user* decides if and when to run this program. I might've had this
tool installed when first setting up the new build, but I got rid of it.
Instead of a tool to check for updates, and download the installers, I
just go to Asrock's web site to check on updates, investigate what the
update does for me, and then download it and run it. I don't need a
tool to get the update installers. There is a BIOS option for "Internet
Flash", but I should've disabled it when reviewing all the BIOS settings
(can't check now because I have to boot to get into BIOS settings).

As far as securing the mobo firmware, well, if you can run software (or
Gigabyte during boot) then so can malware. The same program you run to
flash the firmware is the same code that malware could use. However,
the trick is to con the user into allowing the update, and Gigabyte
apparently took away that safety step.

Although the Fox article is dated today (June 11), it is old.

https://www.bleepingcomputer.com/news/security/gigabyte-releases-new-firmware-to-fix-recently-disclosed-security-flaws/

Dated June 5, and says a firmware update was released 5 days earlier.
Also notes:

"The WPBT allows vendors and OEMs to run an .exe program in the UEFI
layer. Every time Windows boots, it looks at the UEFI, and runs the
.exe. It's used to run programs that aren't included with the Windows
media," explains Microsoft.

So, it is NOT a firmware-based auto-updater. It is a file desposited
into UEFI which if found /after/ Windows boots then Windows will run.
The above article says how to disable the feature in Gigabyte's BIOS
settings, so *TURN IT OFF*, and /you/ decide when you have prepared to
check for firmware updates, check if they really apply to you, and apply
them knowing you risk the brain surgery committed on your mobo.

I'm hunting around for how to disable Windows Platform Binary Table
(WPBT) available in Windows 8+. So far, I found:

https://github.com/Jamesits/dropWPBT

You can use Nirsoft's FirmwareTablesView to see the firmware tables
(ACPI, SMBIOS), but I'm yet not sure what to look for, you're just
viewing, and where the .exe is stored in UEFI is not identified.

https://www.nirsoft.net/utils/firmware_tables_view.html

I don't see a WPBT labelled ACPI table in the list from Nirsoft's tool.
As I recall, Windows 7 was the first OS on this computer build, and WPBT
didn't show up until Windows 8, and later.

More info on Windows Platform Binary Table (WPBT) at:

https://download.microsoft.com/download/8/a/2/8a2fb72d-9b96-4e2d-a559-4a27cf905a80/windows-platform-binary-table.docx

WPBT is Microsoft's rootkit method. Can be used for firmware updates,
anti-theft software, or whatever the UEFI-embedded .exe does.

"Everyone Gets A Rootkit"
https://eclypsium.com/research/everyone-gets-a-rootkit/

They mention using Windows Defender's App Control feature to mitigate
the WPBT vulnerability (if it exists for your mobo). See:

https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview

So, instead of keeping the barn door closed and controlling horses can
exit through the barn door, you close the gate to a fence surrounding
the barn, and control which horses can go through the gate. But you
have the problem of not knowing which horses to exit through the fence
gate ("How Odysseus Tricked Polyphemus the Cyclops to Escape",
https://www.greekboston.com/culture/mythology/odysseus-tricked-polyphemus/).

Rather than go through all that shit, I'll just check my BIOS has no
auto-update settings to its firmware, and see if it's easier to disable
WPBT to eliminate the vulnerability from the Windows end.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<1w8pg0eiesguc$.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72296&group=alt.comp.os.windows-10#72296

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC’s_motherboard_have_hidden
_vulnerability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 16:10:09 -0500
Organization: Usenet Elder
Lines: 12
Sender: V@nguard.LH
Message-ID: <1w8pg0eiesguc$.dlg@v.nguard.lh>
References: <20230611141837.5ca0d14e@mx> <z8u3k4elb9zy.dlg@v.nguard.lh>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 6HXQHhgkQuBT6Fo6S11+ygpm3y8b4IY19sRkPKbK9IzwTFJYLp
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:WoT6v0uPWDHr4r9UkeHG3XrS4QY=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Sun, 11 Jun 2023 21:10 UTC

https://michlstechblog.info/blog/windows-identify-a-wpbt-binary-in-biosuefi/

To identify if your Windows system is executing a WPBT binary check if
file C:\Windows\system32\wpbbin.exe exists.

The idea is to delete or rename the file, but I've seen other articles
(one of which I cited) that says the absence of this file is not
definitive proof WPBT won't happen after booting into Windows, and
Windows finding the .exe in the ACPI WPBT table. I don't have this
file, but I want better assurance WPBT is dead on my setup. Microsoft
might install a different executable in an update, or have some sneaky
way to effect WPBT without this particular file.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<bmphljx543.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72297&group=alt.comp.os.windows-10#72297

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.neodome.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 23:07:55 +0200
Lines: 83
Message-ID: <bmphljx543.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
<u659a7$2q0m0$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net TTRp0hHRRBWqy9YTGPdZcQVruFbY2HYtnGjMjomk99nYOBWK4w
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:bAPB6m4zQjsz0jhlqOXpFzapUZE=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <u659a7$2q0m0$1@dont-email.me>
 by: Carlos E.R. - Sun, 11 Jun 2023 21:07 UTC

On 2023-06-11 22:03, Paul wrote:
> On 6/11/2023 3:23 PM, Carlos E.R. wrote:
>> On 2023-06-11 21:18, Johnny wrote:
>>>
>>> Published June 11, 2023
>>>
>>> A cybersecurity company called Eclypsium has made a startling
>>> discovery. They found a hidden backdoor in the firmware of motherboards
>>> (the main circuit board in a computer) made by a Taiwanese company
>>> called Gigabyte, and this backdoor makes the motherboards easily
>>> accessible for hackers to break into.
>>>
>>> Gigabyte apparently integrated a Windows executable file into the
>>> firmware of its motherboards. This file is executed when the computer
>>> starts up, meaning that each time you restart your computer, the
>>> firmware's code activates Gigabyte's app center. This app center then
>>> proceeds to download and run a file from the internet.
>>
>> I'd appreciate some technical language, instead of layman first grader
>> speak.
>>
>> What you posted is impossible to decipher.
>>
>>>
>>> Continued:
>>>
>>> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
>
> https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/
>
>    "Our follow-up analysis discovered that firmware in Gigabyte systems is
>     dropping and executing a Windows native executable during the system
>     startup process, and this executable then downloads and executes
>     additional payloads insecurely. It uses the same techniques as other
>     OEM backdoor-like features like Computrace backdoor (a.k.a. LoJack DoubleAgent)
>     abused by threat actors and even firmware implants such as Sednit LoJax,
>     MosaicRegressor, Vector-EDK. Subsequent analysis showed that this same code
>     is present in hundreds of models of Gigabyte PCs. We are working with
>     Gigabyte to address this insecure implementation of their app center capability."
>
> Here is an example of a Computrace dropper (attack from BIOS). Computrace
> would be popular in laptop design. Computrace got right to the point,
> mounted
> the file system and overwrote autochk.exe :-)
>
> https://www.blackhat.com/docs/us-14/materials/us-14-Kamluk-Computrace-Backdoor-Revisited-WP.pdf
>
> By flash-updating the BIOS, as long as the structures and code are
> removed, there will be no "new occurrences". But you would not know
> whether a persistent threat had been put onboard or not. It would depend
> on what the dropper did to gain a foothold.

That's better, thanks.

Having a windows executable in the firmware is interesting. Would Linux
computers be at risk? Maybe they haven't even considering the issue at
Eclypsium:

2. Eclypsium has released a PowerShell script to Github
that can assist in determining whether a system is impacted.

So, a Linux machine can not be analyzed.

Stage 2: Downloading and running further executables

Plain HTTP (the first bullet above) should never be used for
updating privileged code as it is easily compromised via
Machine-in-the-middle (MITM) attacks. However, we noticed
that even when using the HTTPS-enabled options, remote server
certificate validation is not implemented correctly.
Therefore, MITM is possible in that case also.

They are really daft these people! How can they be this incompetent in
the XXI?

--
Cheers, Carlos.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<y4iyglgl1my2.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72299&group=alt.comp.os.windows-10#72299

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC’s_motherboard_have_hidden
_vulnerability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 16:15:43 -0500
Organization: Usenet Elder
Lines: 11
Sender: V@nguard.LH
Message-ID: <y4iyglgl1my2.dlg@v.nguard.lh>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor> <u659a7$2q0m0$1@dont-email.me> <bmphljx543.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net z/wkCn/GqFHBMTKpFz36YgLePg6F5cvL2tBvyXufCScxFi51vp
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:ERBaZKc+YWVu5Ru9+Sw9q+MZSpE=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Sun, 11 Jun 2023 21:15 UTC

"Carlos E.R." <robin_listas@es.invalid> wrote:

> Having a windows executable in the firmware is interesting. Would Linux
> computers be at risk?

See my other reply (to Johnny). It's a Windows 8+ "feature": Windows
Platform Binary Table (WPBT) - a built-in UEFI-based rootkit. Deposit
an .exe into the WPBT ACPI table, and Windows (after booting) will run
the .exe if found -- ANY .exe that's there. It's a Windows 8+ thing
(well, along with UEFI). You would have to check if Linux after booting
will load executables stored in the UEFI.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<r7qhljx543.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72300&group=alt.comp.os.windows-10#72300

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 23:17:15 +0200
Lines: 30
Message-ID: <r7qhljx543.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx> <z8u3k4elb9zy.dlg@v.nguard.lh>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net uNh6JoO6IXXiu6JXzXSYAgAK3Kk5rdkF2vpAtH/TdQvPUUlRS6
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:DrhQybKhKvCGsxB7ofMtfSxdRTE=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <z8u3k4elb9zy.dlg@v.nguard.lh>
 by: Carlos E.R. - Sun, 11 Jun 2023 21:17 UTC

On 2023-06-11 23:02, VanguardLH wrote:
> Johnny <johnny@invalid.net> wrote:
>
>> Published June 11, 2023
>>
>> A cybersecurity company called Eclypsium has made a startling
>> discovery. They found a hidden backdoor in the firmware of motherboards
>> (the main circuit board in a computer) made by a Taiwanese company
>> called Gigabyte, and this backdoor makes the motherboards easily
>> accessible for hackers to break into.
>>
>> Gigabyte apparently integrated a Windows executable file into the
>> firmware of its motherboards. This file is executed when the computer
>> starts up, meaning that each time you restart your computer, the
>> firmware's code activates Gigabyte's app center. This app center then
>> proceeds to download and run a file from the internet.
>>
>> Continued:
>>
>> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
>
> A Windows executable file. That means the OS has to be available to
> support running a Win32 executable. Well, if Windows gets loaded by the
> BIOS then what's the point of later re-loading it after the POST screen?

AFAIK it is loaded by UEFI before Windows loads. You can't stop it.

--
Cheers, Carlos.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<4tqhljx543.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72301&group=alt.comp.os.windows-10#72301

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 23:28:36 +0200
Lines: 21
Message-ID: <4tqhljx543.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
<u659a7$2q0m0$1@dont-email.me> <bmphljx543.ln2@Telcontar.valinor>
<y4iyglgl1my2.dlg@v.nguard.lh>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net IzqdymjbjQS+UrmBxksM0QSF+X779vT7oLC3zM9EfHL7sqHp8p
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:iU1oojQATLjMqgTTtv1h3d95Bsk=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <y4iyglgl1my2.dlg@v.nguard.lh>
 by: Carlos E.R. - Sun, 11 Jun 2023 21:28 UTC

On 2023-06-11 23:15, VanguardLH wrote:
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>> Having a windows executable in the firmware is interesting. Would Linux
>> computers be at risk?
>
> See my other reply (to Johnny). It's a Windows 8+ "feature": Windows
> Platform Binary Table (WPBT) - a built-in UEFI-based rootkit. Deposit
> an .exe into the WPBT ACPI table, and Windows (after booting) will run
> the .exe if found -- ANY .exe that's there. It's a Windows 8+ thing
> (well, along with UEFI). You would have to check if Linux after booting
> will load executables stored in the UEFI.

It might.

A machine sold with Linux installed by the manufacturer might include
this feature. I have not heard of such a thing, but I think it is possible.

--
Cheers, Carlos.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<jicvksnvg7s1$.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72302&group=alt.comp.os.windows-10#72302

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: Does your PC’s_motherboard_have_hidden
_vulnerability_that_could_put_you_at_risk?
Date: Sun, 11 Jun 2023 16:48:22 -0500
Organization: Usenet Elder
Lines: 16
Sender: V@nguard.LH
Message-ID: <jicvksnvg7s1$.dlg@v.nguard.lh>
References: <20230611141837.5ca0d14e@mx> <z8u3k4elb9zy.dlg@v.nguard.lh> <r7qhljx543.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net C6jyHyiDGNUcST5WNr/Ekg+YHvZroPkV3gboz+Th6QKt/xWLmO
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:rCD/47PlGbQvAzcrxQQHDQ1PXHo=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Sun, 11 Jun 2023 21:48 UTC

"Carlos E.R." <robin_listas@es.invalid> wrote:

> AFAIK it is loaded by UEFI before Windows loads. You can't stop it.

Nope. The .exe is deposited into the WPBT ACPI table in UEFI, and
Windows, after booting, will run wpbbin.exe to check if there is an .exe
there, and if so run the .exe under the Windows OS.

An .exe alone (no OS) wouldn't run. It would have to be a machine code
program (specific to the mobo hardware) that still some dispatcher would
have to load into memory to run the machine code. From the
vulnerability description, it's a Win32 .exe file which requires it get
loaded by Windows' dispatcher into memory and execution started along
with support from the Win32 and C runtimes provided by Windows. That's
why it's called a Windows executable stored in the UEFI. The program
file is there, but an OS has to load to load and run it.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<keob5lFgvvbU1@mid.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72307&group=alt.comp.os.windows-10#72307

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Mon, 12 Jun 2023 11:43:01 +0100
Lines: 14
Message-ID: <keob5lFgvvbU1@mid.individual.net>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Ls1VJEtZAmpRD8hip0I9/Qk0ZSV7HPvAwMO+sYvl4IYqmtonSI
Cancel-Lock: sha1:5Z3pyYbJVGbJMpVN7LVmsMw2/HI=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.2
Content-Language: en-GB
In-Reply-To: <1jjhljxpek.ln2@Telcontar.valinor>
 by: Andy Burns - Mon, 12 Jun 2023 10:43 UTC

Carlos E.R. wrote:

> I'd appreciate some technical language, instead of layman first grader
> speak.
> What you posted is impossible to decipher.

<https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/>

The bios extracts a .exe from itself at boot time, copies it o hard
drive, when run, the exe downloads further updates from gigabyte
website, but in an insecure way that could be compromised ...

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<keob9nFgvvbU2@mid.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72308&group=alt.comp.os.windows-10#72308

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Mon, 12 Jun 2023 11:45:11 +0100
Lines: 10
Message-ID: <keob9nFgvvbU2@mid.individual.net>
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
<u659a7$2q0m0$1@dont-email.me> <bmphljx543.ln2@Telcontar.valinor>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net Sl8oBM7FlSl4uHWy7GYggASZptCIbCx2PUCIpd0bx2mW2x36uK
Cancel-Lock: sha1:DbBlAO1IjPvAt5g1S4v9ES01Tbg=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.2
Content-Language: en-GB
In-Reply-To: <bmphljx543.ln2@Telcontar.valinor>
 by: Andy Burns - Mon, 12 Jun 2023 10:45 UTC

Carlos E.R. wrote:

>
>      2. Eclypsium has released a PowerShell script to Github
>      that can assist in determining whether a system is impacted.
>
> So, a Linux machine can not be analyzed.

powershell does run on Linux, but I doubt Eclypsiumm have written/tested
their script in that manner.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<72JhM.33360$fZx2.13526@fx14.iad>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72313&group=alt.comp.os.windows-10#72313

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx14.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Content-Language: en-US
Newsgroups: alt.comp.os.windows-10
References: <20230611141837.5ca0d14e@mx> <1jjhljxpek.ln2@Telcontar.valinor>
<u659a7$2q0m0$1@dont-email.me> <bmphljx543.ln2@Telcontar.valinor>
<y4iyglgl1my2.dlg@v.nguard.lh>
From: not.email@all.invalid (Sam E)
In-Reply-To: <y4iyglgl1my2.dlg@v.nguard.lh>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 16
Message-ID: <72JhM.33360$fZx2.13526@fx14.iad>
X-Complaints-To: abuse@usenet-news.net
NNTP-Posting-Date: Mon, 12 Jun 2023 17:59:31 UTC
Organization: usenet-news.net
Date: Mon, 12 Jun 2023 12:59:31 -0500
X-Received-Bytes: 1678
 by: Sam E - Mon, 12 Jun 2023 17:59 UTC

On 6/11/23 16:15, VanguardLH wrote:
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>> Having a windows executable in the firmware is interesting. Would Linux
>> computers be at risk?
>
> See my other reply (to Johnny). It's a Windows 8+ "feature": Windows
> Platform Binary Table (WPBT) - a built-in UEFI-based rootkit. Deposit
> an .exe into the WPBT ACPI table, and Windows (after booting) will run
> the .exe if found -- ANY .exe that's there. It's a Windows 8+ thing
> (well, along with UEFI). You would have to check if Linux after booting
> will load executables stored in the UEFI.

IIRC, Linux doesn't do anything with .EXE files unless WINE is
installed, and WINE has limitations. Maybe it won't run the malware.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<u681a1$37pq9$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72315&group=alt.comp.os.windows-10#72315

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jbb@notatt.com (Jeff Barnett)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Mon, 12 Jun 2023 15:05:02 -0600
Organization: A noiseless patient Spider
Lines: 57
Message-ID: <u681a1$37pq9$1@dont-email.me>
References: <20230611141837.5ca0d14e@mx>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 12 Jun 2023 21:05:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="83487a5528a7ae70d208a9d256f2a150";
logging-data="3401545"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18S2cNPkB/KwFiqQTliAY+S3Qgk0MMKt40="
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.12.0
Cancel-Lock: sha1:G5mGYqmj4mssG26CR67U60KGHsA=
Content-Language: en-US
In-Reply-To: <20230611141837.5ca0d14e@mx>
 by: Jeff Barnett - Mon, 12 Jun 2023 21:05 UTC

On 6/11/2023 1:18 PM, Johnny wrote:
>
> Published June 11, 2023
>
> A cybersecurity company called Eclypsium has made a startling
> discovery. They found a hidden backdoor in the firmware of motherboards
> (the main circuit board in a computer) made by a Taiwanese company
> called Gigabyte, and this backdoor makes the motherboards easily
> accessible for hackers to break into.
>
> Gigabyte apparently integrated a Windows executable file into the
> firmware of its motherboards. This file is executed when the computer
> starts up, meaning that each time you restart your computer, the
> firmware's code activates Gigabyte's app center. This app center then
> proceeds to download and run a file from the internet.
>
> Continued:
>
> https://www.foxnews.com/tech/pcs-motherboard-hidden-vulnerability-risk
I once was helping look at the feasibility of moving a modeled and
verified security kennel from older hardware to a more modern CPU such
as a Pentium. For fun, I read the current (at that time) ACPI spec. It's
the kind of reading that hurts the eyes and makes you want to run
outside and forget computers. A few years later, I read through an
updated spec. Ugh. Those specs were the basic definition of plug and
play and power management for most existing computers today.

There was a most interesting feature in those specs that is relevant to
this thread: a conforming implementation must provide a script language
(well defined within the specs) that could be used to write the code for
some or most layers of drivers. The runtime for that language could and
often was an interpreter though various amounts of compilation were
envisioned - compile to something that looked like P-code or Java all
the way up to native machine code. The kicker was how the code could be
introduced to the system. There seemed to be two possibilities:

1. The driver writer used it to package OS specific drives - the kind of
things you get on a CD with your device or by download.

2. The device "hands" the code to the OS during one of the enumeration
passes.

Option one was clearly in play. However, it seemed that so was Option
two. Option two blow any sort of formal verification "reuse" out of the
water. (Remember I was investigating moving a formally verified kennel
and trying to maintain the certification.) I tried to get more
information as to Option two but was not successful.

Note that Option two is a way for a device to stuff code into an OS at a
level where it can do anything it pleases! Could this be what was going
on at Gigabyte? Where they just obeying the ACPI spec?

If anyone has some more specific information about all of this, I'd love
to hear it.
--
Jeff Barnett

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<sqqlljxa4e.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72322&group=alt.comp.os.windows-10#72322

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!lilly.ping.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vuln
erability_that_could_put_you_at_risk?
Date: Tue, 13 Jun 2023 11:51:56 +0200
Lines: 14
Message-ID: <sqqlljxa4e.ln2@Telcontar.valinor>
References: <20230611141837.5ca0d14e@mx> <u681a1$37pq9$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net crnpZL6wODWRqpy1AObonwOlEBxlOGW2eGSyv9dVJH1FUlrYp/
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:yH5I6ltQ3j9w5oTgiUneEI1OmDE=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Content-Language: es-ES, en-CA
In-Reply-To: <u681a1$37pq9$1@dont-email.me>
 by: Carlos E.R. - Tue, 13 Jun 2023 09:51 UTC

On 2023-06-12 23:05, Jeff Barnett wrote:
> On 6/11/2023 1:18 PM, Johnny wrote:

....

> Note that Option two is a way for a device to stuff code into an OS at a
> level where it can do anything it pleases! Could this be what was going
> on at Gigabyte? Where they just obeying the ACPI spec?

UEFI spec.

--
Cheers, Carlos.

Re: Does your PC’s motherboard have hidden vulnerability that could put you at risk?

<u69ksd$3iuve$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=72323&group=alt.comp.os.windows-10#72323

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: alt.comp.os.windows-10
Subject: Re:_Does_your_PC’s_motherboard_have_hidden_vulner
ability_that_could_put_you_at_risk?
Date: Tue, 13 Jun 2023 07:45:16 -0400
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <u69ksd$3iuve$1@dont-email.me>
References: <20230611141837.5ca0d14e@mx> <u681a1$37pq9$1@dont-email.me>
<sqqlljxa4e.ln2@Telcontar.valinor>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 13 Jun 2023 11:45:17 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="3edc901f56fea9cb148cebb2f3a89a01";
logging-data="3767278"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/QcdFbymYD956rfOtt9xfWJjLxmWtP0qg="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:9pB54feYvbqkAiDCpu8nxxTrSs0=
Content-Language: en-US
In-Reply-To: <sqqlljxa4e.ln2@Telcontar.valinor>
 by: Paul - Tue, 13 Jun 2023 11:45 UTC

On 6/13/2023 5:51 AM, Carlos E.R. wrote:
> On 2023-06-12 23:05, Jeff Barnett wrote:
>> On 6/11/2023 1:18 PM, Johnny wrote:
>
> ...
>
>> Note that Option two is a way for a device to stuff code into an OS at a level where it can do anything it pleases! Could this be what was going on at Gigabyte? Where they just obeying the ACPI spec?
>
> UEFI spec.
>
And the term would be "exploiting the UEFI spec".

*******

While you're sitting there, UEFI is running at the
same time as your OS is running. SMI interrupt, raised
maybe 30 times a second, allow UEFI to run for short
intervals, and adjust power converters and voltages.
And these are "UEFI", because we have to associate
some firmware entity with the responsibility. SMI
(system management interrupt) and System Management Mode (SMM),
is a high priority interrupt, higher than the clock tick
(if clock ticks are being used), and capable of usurping the OS.

There are lots of details about modern hardware that
need documentation.

In this picture, I am using a whizzy piece of software,
just for a readout, to see what my machine is doing. The
fan speed (not shown), varies in real time, and the noise
of the fan correlates with some of the dials in this. This
watches as UEFI adjusts the knobs in the (SMI) background.

[Picture]

https://i.postimg.cc/wjGtvFXK/automatic-cooling-system-readout.gif

One reason it says on the CPU box "water cooling recommended", is
the full frequency range is "exposed" if you have sufficient cooling.
If your cooling isn't quite there (my cooler is a little weak
on purpose), then the adjustment process will not run the CPU
at peak frequency. With a water cooler attached, there would
be more "headroom" for the adjuster to work.

The sad part, is when you visit Tomshardware with your web browser,
there is enough Javascript railing a core, to really make the fan noisy.
Carrying out other tasks, running on all cores, the fan is not
quite as noisy (since the system is now "resource limited"). Without
looking, I can now tell which sites have an "excess of advertising".
I just listen to the fan.

I expect the same sort of function, on Intel boards, but with a
different sensor suite inside the hardware.

Speedfan no longer works on my board (no driver for the SuperIO).
Even Linux "sensor" package, cannot read out anything! (A linux
guy does have a driver, but it's not in the kernel at the moment.)

So right now, the AMD software is all I've got. (The MSI mobo package,
if there is one, is "too big" to be loading onto the machine.
The AMD one is bad enough in this regard, on its own, and is
more than 100MB.) And all of the companies want to "spy on your
usage pattern", so you have to remember to untick the box about
reporting to headquarters.

Paul


computers / alt.comp.os.windows-10 / Does your PC’s motherboard have hidden vulnerability that could put you at risk?

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor