Повреждение прошивки
Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot, thus denying the availability to use the devices and/or the system.(Citation: Symantec Chernobyl W95.CIH) Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices may include the motherboard, hard drive, or video cards. In general, adversaries may manipulate, overwrite, or corrupt firmware in order to deny the use of the system or devices. For example, corruption of firmware responsible for loading the operating system for network devices may render the network devices inoperable.(Citation: dhs_threat_to_net_devices)(Citation: cisa_malware_orgs_ukraine) Depending on the device, this attack may also result in Data Destruction.
Примеры процедур |
|
Название | Описание |
---|---|
Bad Rabbit |
Bad Rabbit has used an executable that installs a modified bootloader to prevent normal boot-up.(Citation: Secure List Bad Rabbit) |
TrickBot |
TrickBot module "Trickboot" can write or erase the UEFI/BIOS firmware of a compromised device.(Citation: Eclypsium Trickboot December 2020) |
Контрмеры |
|
Контрмера | Описание |
---|---|
Update Software |
Perform regular software updates to mitigate exploitation risk. |
Privileged Account Management |
Manage the creation, modification, use, and permissions associated to privileged accounts, including SYSTEM and root. |
Firmware Corruption Mitigation |
Prevent adversary access to privileged accounts or access necessary to perform this technique. Check the integrity of the existing BIOS and device firmware to determine if it is vulnerable to modification. Patch the BIOS and other firmware as necessary to prevent successful use of known vulnerabilities. |
Boot Integrity |
Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms. |
Обнаружение
System firmware manipulation may be detected.(Citation: MITRE Trustworthy Firmware Measurement) Log attempts to read/write to BIOS and compare against known patching behavior.
Ссылки
- Yamamura, M. (2002, April 25). W95.CIH. Retrieved April 12, 2019.
- Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.
- U.S. Department of Homeland Security. (2016, August 30). The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations. Retrieved July 29, 2022.
- CISA. (2022, April 28). Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine. Retrieved July 29, 2022.
- Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.
- Eclypsium, Advanced Intelligence. (2020, December 1). TRICKBOT NOW OFFERS ‘TRICKBOOT’: PERSIST, BRICK, PROFIT. Retrieved March 15, 2021.
Связанные риски
Риск | Связи | |
---|---|---|
Закрепление злоумышленника в ОС
из-за
возможности модификации BIOS/UEFI
в микропрограммном обеспечении
Повышение привилегий
НСД
|
|
|
Обход систем защиты
из-за
возможности модификации BIOS/UEFI
в микропрограммном обеспечении
Повышение привилегий
Целостность
|
|
|
Физическое повреждение оборудования
из-за
возможности модификации BIOS/UEFI
в микропрограммном обеспечении
Доступность
Отказ в обслуживании
|
|
|
Неработоспособность операционной системы
из-за
возможности модификации BIOS/UEFI
в микропрограммном обеспечении
Доступность
Отказ в обслуживании
|
|
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.