top | item 42395177

(no title)

PrimaryAlibi | 1 year ago

good answer, I will read more about uefi bootkits and blacklotus. It also reminds me that recently bootkitty uefi bootkit was in news. i saw a video about it a couple days ago.

Is it just from userspace you flash these firmware (other than boot rom)? Or can you flash externally as well if you have physical access?

This also means that just like you avoid a lot of malware by going to linux instead of windows which is what all hackers build their malware for, you can probably also avoid a lot of these firmware bootkits by flashing coreboot instead of having UEFI.

discuss

order

bigfatkitten|1 year ago

Both userspace or externally, including the boot ROM, from Windows or Linux.

You could flash coreboot and run your own secure boot chain etc on one machine, but this is absolutely not something you can do at organisational scale.

That said, only individuals worried about foreign intelligence services need to incorporate this into their threat model.

PrimaryAlibi|1 year ago

How would it be done externally? Is it done same way as flashing the boot rom? You just need to know where the chip is for the other components? No 0-days needed? Or do you need a 0-day to do this? Is that why you think only foreign intelligence agencies are the ones who can do this? Also assume that the bios is password protected and it's configured in bios to not boot from a USB drive.