Announcement

Collapse
No announcement yet.

It's Now Possible To Disable & Strip Down Intel's ME Blob

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #51
    Originally posted by SystemCrasher View Post
    On other hand, Supermicro has been caught on BMC backdoor.
    Yeah, after HP, Dell and others were caught with total bullshit running in their BMC's too. Old hat, everyone half-serious was already firewalling that.

    Its just technically challenging thing to do. However, there was "ring -3" rootkit PoC from infamous Joanna Rutkowska. Which did exactly that: it broken into ME, ran native ME code and it could do whatever it wants to the rest of system, being completely invisible to x86-side software.
    You are blowing this a bit out of proportion. She made an exploit in 2009 against TPM and it involved also ME, that's a bit different than getting full control. I also didn't find any "ring -3" rootkit.

    Granted Mirai (IoT enabled botnet) source has leaked and even made it to github, fighting botnets going to look pretty much like fighting windmills I guess. I could bet l33t script kiddies are setting up new botnets much faster than these botnets are shut down and their owners jailed.
    Botnets are handled by business-oriented criminals with skills and all, not by script kiddies. They are after money, not after random disruption. Script kiddies are in general out of serious hacking scene since at least decades.

    Would it happen to ME backdoors?
    As I said above, botnets are the IT equivalent of swarms of mooks, their traffic isn't exactly complex to detect, the issue is that their numbers are huge and you don't own their devices so you can't realistically shut them down or force a random chinese manufacturer to not fucking use "0000" as default root password on SSH.

    If botnets were using ME, it would be found out pretty quickly that ME is involved, and shit would start flying for Intel.

    Which tells nothing on what powers they technically have.
    I know the powers they wield, an admin with a ME/AMT management console can do pretty much all he wants on a target PC. And the providers of that stuff is Intel.
    MS can push updates you can't avoid anymore on win10, that means they can insta-pwn all win10 devices if they so choose. With other OS they could just push updates, so they could still pwn your PC as long as you had your updates enabled.

    Besides, any software company can do the same, they can push updates on your PC, and if you agree you give the updater root access anyway.

    Note that I'm not saying they are necessarily using it for evil.

    I can't imagine good reasons to put so much proprietary blobs "for your convenience".
    I can. Using blobs and secured shit with signatures and stuff isn't necessarily to hide evil intent. There is many people that still genuinely thinks that closed-source is safer, especially in companies.
    Usually closed-source and proprietary blobs are used to hide half-assed features and copyright infringement from the eyes of experts that would call them out.

    There is fancy thing: this is most widespread HW around the globe. Being smarter? Possible, BUT not everyone could afford it. After all, it takes higher level of expertise, so you can't just go nearby shop and buy arbitrary PC/laptop/MB. Things are getting slightly more complicated.
    Broadly irrelevant, when you get caught by secret police these excuses are not going to save you.

    Very valid point. Though I could imagine backdoors using side-channel signalling
    Last time I checked "side-channel signalling" was EM interference generated by devices, which is kinda fucking short-ranged, so I'd say you are getting a bit carried away.

    Comment


    • #52
      Originally posted by starshipeleven View Post
      I think these things are a slightly more carefully guarded secret than say Mediatek SDKs that can be easily found on panbaidu. Or Allwinner's full hardware docs that are on sunxi's download servers.
      Well the Skylake USB debugging gives us an example, or the existing ME rootkits. Most of your arguments have been addressed by SystemCrasher already, so I will not repeat those here.

      Originally posted by starshipeleven View Post
      He might not be using his Intel hardware for truly secure stuff, I don't know. If you use Intel hardware (or relatively recent AMD hardware) for truly secure stuff you are a dumbfuck, period.
      So you say that his efforts are futile? I wonder why nobody of the thousands who were in the audience or watched the live stream pointed this out.

      Originally posted by starshipeleven View Post
      Still in plain sight for any other device in the same local network, host included if it is using another network controller to get the same packets in (if mirrored to it by the router/switch, for example). It's not like they send packets through telepathy, a router running LEDE/OpenWRT with a proper setup will be a pretty effective watchdog here.
      If you look at Patrick Stewin's talk (btw. another very nice and smart person), he implemented basically undetectable exfiltration through deliberately introducing packet jitter. Combine this with advertising networks' ability to target users by IP range, you don't even need to control anything on the ISP side of things.

      Originally posted by starshipeleven View Post
      Still not seeing proof of these updates.
      Exploit doesn't work if you install latest BIOS. What kind of additional proof do you want?

      Originally posted by starshipeleven View Post
      Anyway, I said "never gets any update" which is both "there is no official update" and "none actually updates the BIOS", so technically it's not moving goalposts. Maybe it's unclear, but not moving goalposts.
      First you say "these firmwares NEVER get any update to patch vulnerabilities",
      then I pointed out that the ME firmware actually got an update,
      then you claim that "the OEM rarely gives a fuck",
      then I point out how this is fixed in the latest BIOS,
      then you say the fix is not distributed to everyone automatically.

      How is that not moving the goalposts?

      Also note that since Windows 8, BIOS updates are distributed through Windows Update as long as vendors choose this path.
      You want proof of that too? We know it because this already caused problems. One widely reported issue is with Minix-PC Z64W being updated by a Techvision UEFI firmware and bricked, because both manufacturers neglected to update the default OEM ID string in the AMI BIOS.

      Comment


      • #53
        Originally posted by starshipeleven View Post
        I know the powers they wield, an admin with a ME/AMT management console can do pretty much all he wants on a target PC. And the providers of that stuff is Intel.
        MS can push updates you can't avoid anymore on win10, that means they can insta-pwn all win10 devices if they so choose. With other OS they could just push updates, so they could still pwn your PC as long as you had your updates enabled.
        Note that you don't get individual updates on previous Windows versions any longer, only cumulative updates.
        So if they bundle a backdoor in the latest round of security fixes, you will be pwned through the backdoor if you install it. And if you don't install it you will be pwned through known public vulnerabilities.

        Comment


        • #54
          About forced BIOS updates in forced Windows updates on the one hand, and attacks on old Windows versions on the other hand: Both are defeated on non-networked machines, and both are defeated on machines on which Windows is removed and especially if it was never activated and never run.

          For those of us who use only LInux, the main danger from Windows is efforts to hardware-lock machines to it, thus the importance of things like ME cleaner. Who cares if some future version of Windows 10 won't boot. So you need dedicated hardware if you really need that 4K netflix-so what? Keeping Trump's Gestapo from monitoring your communications or turning on cameras and microphones remotely is far more important.

          Comment

          Working...
          X