Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Russian researchers expose NSA secret weapon: Program that enables America to spy on every computer
DailyMail ^ | 16 February 2015 | Reuters Reporter and Chris Spargo

Posted on 02/17/2015 9:02:27 AM PST by dennisw

The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists.

The National Security Agency has figured out how to hide spying software deep within hard drives, allowing them to monitor and eavesdrop on the majority of the world's computers - even when they are not connected to the internet.

This 'surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades,' said Kaspersky.

'The hardware will be able to infect the computer over and over,' lead Kaspersky researcher Costin Raiu said in an interview.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

What's more, even the makers of these hard drives are unaware that these spying programs have been installed, with the NSA obtaining their source codes by going so far as to pose as software developers according to former intelligence operatives, or telling the companies the government must do a security audit to make sure their source code is safe.

The group said it found personal computers in 30 countries infected The most infections were seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria

The Moscow-based security software maker Kaspersky Lab said it has found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

(Excerpt) Read more at dailymail.co.uk ...


TOPICS: Business/Economy; Culture/Society; Foreign Affairs; Russia
KEYWORDS: kaspersky; nsa; pravda; russia
Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last
To: Star Traveler

I could imagine a number of ways they could compromise a developer so the he would share the source code: money, amnesty from prosecution (legal blackmail), offers of employment, etc. When you print the money and run the prisons all doors are open.


41 posted on 02/17/2015 11:30:02 AM PST by WMarshal (Free citizen, never a subject or a civilian)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Jan_Sobieski

Good one!


42 posted on 02/17/2015 11:32:57 AM PST by Iron Munro (Mark Steyn: “fundamentally transformed” is a euphemism for “wrecked beyond repair.”)
[ Post Reply | Private Reply | To 23 | View Replies]

To: roamer_1

A write protect will not defend device firmware, at least not for something like a HDD. I know a former drive engineer, he told me that much of the firmware is actually on the disk, and extensible. He noted that most modern drives remap and move data from rough areas to good areas, all within the controller, transparent to the OS.

What this means, is that if someone knows how to hook the drive controller into code stored on disk, their software can install itself, then hide itself. Drives have had large ram caches for sometime, so probably pretty easy to whittle away a bit of that ram for some underhanded activity in the controller.

Basically there is no practical way for us end users and even engineers to control the entire chain. Many subsystems in the current pc have multiple teams working on just a single subsystem - and that is just the software side. One person to verify and vet all of the software would be impossible, not to mention the hardware itself.

So in digital systems, trust is a very flimsy concept, and it takes only a single line of code to open a hole. There are billions of lines of code in a PC.

Also, I have seen mention of “airgap” security. Wrong. No such thing exists. Modern cpus, gpus, controllers, etc are fast enough that they can create a radio transmitter out of the circuit board they are attach too. Just toggle a line rapidly, and you have a transmitter. Infect the target, have wet assets drive by that office every night with a modem that can grab the radio signal.


43 posted on 02/17/2015 11:45:22 AM PST by Aqua225 (Realist)
[ Post Reply | Private Reply | To 33 | View Replies]

To: BenLurkin
This is not a partisan thing. Both parties have no respect whatsoever for us, or our right to privacy. I've come to the conclusion that our government is illegitimate, as it only serves itself, and not the people.
44 posted on 02/17/2015 1:04:33 PM PST by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Aqua225
he told me that much of the firmware is actually on the disk, and extensible

Thank you for your post - But you must understand that the above is in and of itself an engineering decision.

There is no real reason not to make card BIOS mechanically protected, outside of the inconvenience of manual switching. I understand BIOS extensibility, and I really do wish it was true that such info was kept on the platters - If it were true, then I should be able to swap cards between hdds (like we did back in the day) to effect repairs and retrieve data.

The size of any BIOS I am aware of can easily fit on on-board chips on the card with plenty of room for BIOS revisions, especially considering the size of flash chips available today. That part (the actual executable programming) should be all that is on the card, and that should, by all, means be protected by jumper.

Look at computer BIOS for comparison - writable to an extent, so extensible, but the actual BIOS itself must be flashed - all on-chip. Controller BIOS is no where near the size of Computer BIOS, and computer BIOS is still quite tiny (if it is still CMOS)

This issue has been coming for a very long time. I can remember this being predicted way back when vid cards started going flash enabled. Shoot, they won't even write protect thumb drives for Pete's sake... That's just dumb.

45 posted on 02/17/2015 1:12:56 PM PST by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: roamer_1

However, what about vulnerabilities within the firmware itself? There could be malformed sata commands, magic bit sequences, etc. that could very well allow new code to be placed on the platters and hidden from the host OS. Or data to be ferreted away for later retrieval.

So an immutable firmware would close one more door, but there are possibly so many more open.

To me, there is nothing that can mitigate these sorts of risks, barring not using machines. Sometimes, even as a systems software engineer myself, a Frank Herbert Dune-esque future seems positively alluring.


46 posted on 02/17/2015 2:40:50 PM PST by Aqua225 (Realist)
[ Post Reply | Private Reply | To 45 | View Replies]

To: dennisw
Firmware malware is actually pretty old. For flashable firmware, you can get to it if the computer is on. If is isn't flashable (meaning it is only flashed one time), you need to get to it prior to installation at the factory.

There were rumors that somebody got to some of Saddam's computers this way, through printer firmware IIRC. I do not know if the rumors were true.

47 posted on 02/17/2015 2:49:46 PM PST by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aqua225
However, what about vulnerabilities within the firmware itself? There could be malformed sata commands, magic bit sequences, etc. that could very well allow new code to be placed on the platters and hidden from the host OS. Or data to be ferreted away for later retrieval.

Which is why I am a firm advocate of open source software (though finding ASM level programmers to survey it is probably getting pretty hard to do :) One can then predict such vulnerabilities and repair them, with many, many more eyes... It keeps everybody legit. That is the primary reason a nix OS is so much more bullet-proof. Too many people to bribe and too hard to sneak malicious code past many sharp-eyed goalies.

So an immutable firmware would close one more door, but there are possibly so many more open.

But closing what you can is necessarily better than what came before.

Dune-esque future seems positively alluring.

Meh. too much sand and no clearwater streams... not for this mountain boy. ; )

48 posted on 02/17/2015 6:51:32 PM PST by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 46 | View Replies]

To: roamer_1

I found this article very informing:

http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/


49 posted on 02/18/2015 3:04:08 AM PST by BCW (ARMIS EXPOSCERE PACEM)
[ Post Reply | Private Reply | To 33 | View Replies]

To: BCW
I found this article very informing:

Thanks.

*SHRUGS* ... It has never made sense to me that info-gathering bugs (like adware/spyware) are money generators - who in their right mind would respond to unwanted ads propagating on their desktop by SUPPORTING any one of the companies in the ads? So what they purport to be for cannot be their true purpose. Leave it at this: Information gathering only makes sense as a MEANS if the perpetrator is some sort of uber/hyper control freak governmental entity. So the big picture here has already been around for a long time... JMO, YMMV.

50 posted on 02/18/2015 8:50:39 AM PST by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 49 | View Replies]

To: roamer_1

I think the only safe computer was on that island in Lost...but that got smashed...I miss the beeping sound...


51 posted on 02/18/2015 9:31:08 AM PST by BCW (ARMIS EXPOSCERE PACEM)
[ Post Reply | Private Reply | To 50 | View Replies]

To: dennisw
It is not clear how the NSA may have obtained the hard drives’ source code.

Well, gee, Mr. Wizard, do you suppose that at some point the source code was transmitted over the internet?

52 posted on 02/18/2015 9:38:32 AM PST by Dalek
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson