Why Virtual Board Portals are the Key to Better Collaboration and Decision-Making

By Owais Sultan

Meetings without paper have become a reality thanks to advanced technologies. Digital tools help companies be more efficient…

This is a post from HackRead.com Read the original post: Why Virtual Board Portals are the Key to Better Collaboration and Decision-Making

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

LogoFAIL attack via image substitution in UEFI | Kaspersky official blog

When you turn on a laptop, the manufacturer’s logo is displayed on the screen before the operating system boots. This logo can actually be changed — a function intended for the use of laptop or desktop manufacturers. But there’s nothing stopping an ordinary user from using it and replacing the default logo with a different image.

The logo is stored in the code that runs immediately after computer is turned on, in the so-called UEFI firmware. It turns out that this logo replacement function opens the way for the device to be seriously compromised — attackers can hack it and subsequently seize control of the system, and this can even be done remotely. The possibility of such an attack, named LogoFAIL, was recently discussed by specialists at Binarly. In this article, we’ll try to explain it in simple terms, but let’s first recall the dangers of so-called UEFI bootkits.

UEFI bootkits: malware loaded before the system

Historically, the program executed upon turning on a PC was called a BIOS (Basic Input/Output System). It was extremely limited in its capabilities, but it was an essential program tasked with initializing the computer’s hardware and then transferring control to the operating system loader. Since the late 2000s, BIOS gradually began to be replaced by UEFI — a more sophisticated version of the same basic program with additional capabilities, including protection against the execution of malicious code.

In particular, UEFI implemented the Secure Boot feature that employed cryptographic algorithms to check the code at each stage of the computer’s booting — from turning it on to loading the operating system. This makes it much more difficult to replace the real OS code with malicious code, for example. But, alas, even these security technologies have not completely eliminated the possibility of loading malicious code at an early stage. And if attackers manage to “smuggle” malware or a so-called bootkit into UEFI, the consequences can be extremely serious.

The issue with UEFI bootkits is that they are extremely difficult to detect from within the operating system. A bootkit can modify system files and run malicious code in an OS with maximum privileges. And the main problem is that it can survive not only a complete reinstall of the operating system, but also replacement of the hard drive. Stashed in the UEFI firmware, a bootkit isn’t dependent on the data stored on the system drive. As a result, bootkits are often used in complex targeted attacks. An example of such an attack is described in this study by our experts.

So, what do images have to do with it?

Since UEFI has fairly robust protection against the execution of malicious code, introducing a Trojan into the boot process isn’t simple. However, as it turns out, it is possible to exploit flaws in the UEFI code to execute arbitrary code at this early stage. There was good reason for the Binarly specialists to pay attention to the mechanism that allows replacing the factory logo. To display the logo, a program is launched that reads data from the graphic image file and displays this image on the screen. What if we try make this program to misbehave?

There are three major UEFI software developers: AMI, Insyde, and Phoenix. Each of them approaches logo processing differently. For example, Insyde has separate image processing programs for different formats, from JPEG to BMP. AMI and Phoenix consolidate handling of all formats into a single program. Vulnerabilities were discovered in each of them, with a total of twenty-four critical errors. The final result of exploiting one of these errors is shown in this video:

LogoFAIL attack demonstration. Source

It’s all fairly simple: the attacker can modify the image of the new logo as they please. This includes, for example, setting the logo resolution so that this parameter ends up beyond the limits defined in the handling code. This leads to a calculation error and ultimately results in data being written from the image file into the area for executable data. This data will then be executed with maximum privileges. The video above shows the seemingly harmless result of such a bootkit: a text file is saved to the Windows desktop. However, if malicious code has this level of access, the attacker can perform almost any action in the operating system.

Notably, some device models from major manufacturers were not susceptible to this attack, and for a very simple reason: replacing the logo in their UEFI is essentially blocked. Among these models are a number of Apple laptops and Dell devices.

Dangerous implications for businesses

Theoretically, this attack can even be carried out remotely: in some cases, it would be enough to inject a specially prepared image into the EFI system partition on the system disk, and it will be processed on the next reboot. The catch is that performing such an operation already require complete access to the system; that is, any data on the computer should already be available to the attackers. You might wonder then, what’s the point of implementing the LogoFAIL attack? To ensure that the malicious code survives even if the OS is reinstalled — this kind of persistence is usually highly desired by APT attack operators.

This problem will gradually be resolved by updated UEFI versions that fix errors in the image handlers. However, since not all companies diligently keep up with firmware updates, a huge number of devices will likely remain unprotected. And the list of vulnerable devices includes not only laptops but also some server motherboards. This means that Binarly’s research should be taken very seriously.

Kaspersky official blog – ​Read More

National Amusements Reveals Data Breach Amid Backlash Affecting 82,000+

By Waqas

The company under criticism is National Amusements, the parent company of media giants such as Paramount and CBS.

This is a post from HackRead.com Read the original post: National Amusements Reveals Data Breach Amid Backlash Affecting 82,000+

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

Corewell Health Suffers Third-Party Data Breach Impacting Over One Million Patients

HealthEC, a population health management platform that provides services to Corewell Health, is the company involved in the breach, which may have compromised sensitive data such as names, addresses, SSNs, and medical records.

Cyware News – Latest Cyber News – ​Read More

Yakult Australia Confirms ‘Cyber Incident’ After 95 GB Data Leak

The cybercrime group, DragonForce, has claimed responsibility for the attack and has leaked 95 GB of data belonging to the company. Yakult Australia is currently investigating the incident with the help of cybersecurity experts.

Cyware News – Latest Cyber News – ​Read More

Fidelity National Financial Subsidiary Says 1.3 Million Affected by November Cyberattack

The cyberattack on Fidelity National Financial was claimed by the AlphV/Blackcat ransomware gang, causing disruption to hundreds of home purchases and leading to the seizure of the gang’s leak site by law enforcement agencies.

Cyware News – Latest Cyber News – ​Read More

Why CISOs Need to Make Cyber Insurers Their Partners

Nobody has more data on cybersecurity risk and losses than a cyber-insurance carrier.

darkreading – ​Read More

Kazakhstan to Extradite Russian Hacker to Moscow

A Russian man accused by the United States of trafficking in a hacked database of online credentials will apparently evade American courts after the Russian government said it had succeeded in extraditing him.

Cyware News – Latest Cyber News – ​Read More

Rhysida Ransomware Group Hacked Abdali Hospital in Jordan

The Rhysida ransomware group has claimed responsibility for hacking Abdali Hospital in Jordan. The group has published proof of the hack, including stolen documents, and is now auctioning off the sensitive data for 10 BTC.

Cyware News – Latest Cyber News – ​Read More

Hackers Steal Customer Data From Europe’s Largest Parking App Operator

EasyPark Group, the owner of brands including RingGo and ParkMobile, said customer names, phone numbers, addresses, email addresses, and parts of credit card numbers had been taken but said parking data had not been compromised in the cyberattack.

Cyware News – Latest Cyber News – ​Read More