Publications by Dark Mentor partners, from before they joined Dark Mentor.
During our work towards trying to help secure firmware, we have begun to discover a trend. There are situations where unused “dead code” can creep into firmware codebases. This can lead to situations where the developers correctly believe that they are not intentionally using the code in question. However, if that code has vulnerabilities that are still attacker-invokable, it leads to a situation where the vendor has increased attack surface. Apple’s vulnerability to CERT VU#552286, which we determined by black box binary analysis, is an example of this. But we have also seen examples of this in private engagements that we cannot speak to publicly. This document is meant to serve as a warning to BIOS developers that they need to check very carefully that no known-vulnerable code somehow ends up on their flash chip, when they dismiss a vulnerability as “not applicable” to their codebase. They could be wrong, and without careful scrutiny, low level vulnerabilities like this can and will fester for years.
(Note: This talk is an updated version of Thunderstrike 2: Sith Strike, with the new vulnerability VU#552286 added, and the new whitepaper about that vulnerability linked herein.)
In this work we teamed up with Trammell Hudson to improve upon his previous Thunderstrike proof of concept. Previously it required physical access to rewrite the flash chip. We suspected that Macs were vulnerable to the same remotely-exploitable vulnerabilities we had shown in the past. And indeed, they were vulnerable to 5/6 issues we had seen previously. This helps show that just because you don’t hear about a vulnerability affecting a particular vendor, doesn’t mean they’re not affected.
To show the consequences of these vulnerabilities, Thunderstrike 2 uses CERT VU#976132 (Darth Venamis) to break into the BIOS from an Apple Thunderbolt Ethernet adapter. Once resident in the BIOS, it infects all new ethernet adapters that it comes in contact with. As such it represents a novel type of “firmworm” that only ever lives in firmware. Because it does not touch the OS or filesystem it will not be detected by traditional security products or forensics professionals.
Yes. Yes you are. Because you’re not patching away the vulnerabilities we and others have found and disclosed, and you’re not inspecting whether anyone has infected your firmware. This talk provides an introduction to firmware threats & capabilities. But because it is longer than previous talks like “Betting BIOS Bugs Won’t Bite Y’er Butt?”, a special emphasis is placed on including actions organizations can take immediately to mitigating firmware vulnerabilities and infections, above and beyond patching.
Discussion of how a SMM MitM attacker (“Smite’em”) can subvert all software-based BIOS capture utilities (including our own Copernicus). Proposed the use of Intel Trusted Execution Technology (TXT) to improve the trustworthiness of the BIOS capture mechanism due to implicit SMI suppression & capability for remote attestation. (Later it was determine that newer hardware doesn’t suppress SMIs. See “SENTER Sandman”.)
(The first appearance at NoSuchCon in May 2013 did not include a discussion of VU#912156, but subsequent talks did.) Discussed how the S-CRTM is supposed to provide trustworthy reporting to detect the presence of BIOS level attackers. First showed a way that an attacker could exploit their way into a BIOS, even if all security mechanisms were properly configured (VU#912156). Then showed “The Tick”, which is BIOS-resident malware that subverts the S-CRTM by lying to the TPM to replay or recalculate a clean measurement. Then showed “The Flea”, which was BIOS malware that could survive attempts to remove it through a reflash, by infecting the new BIOS as it is about to be written. To defense against such attacks, and build a stronger S-CRTM, we used our existing work on Timing-Based Attestation to create “BIOS Chronomancy”. This defensive technique allows for the customization of the BIOS to provide timing side-channel tamper-evidence to allow for the detection of BIOS malware. Also released “Copernicus”, a free Windows tool for inspecting the BIOS vulnerability/integrity state. This talk was effectively 3 talks crammed into one, so that we could guarantee we would get into BlackHat. ;)
Making the “New Results for Timing-Based Attestation” paper content accessible to a Defcon audience.