Uncategorized

Haven and evil maids

https://github.com/guardianproject/haven

https://play.google.com/store/apps/details?id=org.havenapp.main

https://guardianproject.github.io/haven/

https://irishtechnews.ie/dealing-with-evil-maid-exploits-and-how-to-protect-your-company/

Dealing with Evil Maid exploits and how to protect your company.
Giulio D’Agostino
August 18, 2018
CyberSecurityMalwareSecurity

An Evil Maid assault is when a device has physically tampered without the device owner’s knowledge. Evil Maid attacks where a bootloader has been installed onto the victim’s computer which defeats full disk encryption. Now, however, thanks to solutions like Edward Snowden’s new Android program, which is called Haven, people can help prevent Evil Maid strikes and protect their devices from physical tampering while they’re not present.[…]This program is vital for those that have sensitive information on their devices and need extra protection against Evil Maid attacks. […]

Seealso: YONTMA and DoNotDisturb

https://firmwaresecurity.com/2018/04/27/donotdisturb-now-with-email-support-and-yontma/

Standard
Uncategorized

SpeculationControl: PowerShell script

SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown). For an explanation on how to interpret the output of this tool, please see Understanding Get-SpeculationControlSettings PowerShell script output.[…]

https://github.com/Microsoft/SpeculationControl

https://support.microsoft.com/en-us/help/4074629/understanding-the-output-of-get-speculationcontrolsettings-powershell

Standard
Uncategorized

NVMe Firmware: I Need Your Data

 

[…]The NVMe ecosystem is pretty new, and things like “what version number firmware am I running now” and “is this firmware OEM firmware or retail firmware” are still queried using vendor-specific extensions. I only have two devices to test with (Lenovo P50 and Dell XPS 13) and so I’m asking for some help with data collection. Primarily I’m trying to find out what NMVe hardware people are actually using, so I can approach the most popular vendors first (via the existing OEMs). I’m also going to be looking at the firmware revision string that each vendor sets to find quirks we need — for instance, Toshiba encodes MODEL VENDOR, and everyone else specifies VENDOR MODEL.[…]

https://blogs.gnome.org/hughsie/2018/08/17/nvme-firmware-i-need-your-data/

Standard
Uncategorized

Eclypsium presentations from Blackhat and DEF CON uploaded

Re: https://firmwaresecurity.com/2018/08/10/eclypsium-remotely-attacking-system-firmware/

https://github.com/HackingThings/Publications/blob/master/2018/DC26_UEFI_EXPLOITATION_MASSES_FINAL.pdf

https://github.com/eclypsium/Publications/blob/master/2018/BlackHat_USA_2018/BH2018_REMOTELY_ATACKING_SYSTEM_FIRMWARE_FINAL.pdf

Standard
Uncategorized

more on Intel-SA-00161

Re: https://firmwaresecurity.com/2018/08/15/intel-sa-00161-l1-terminal-fault-l1tf-speculative-execution-side-channel-attack-foreshadow/

and https://firmwaresecurity.com/2018/08/15/more-on-intel-sa-00161/ :

Update from Intel:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

 

https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html

https://careers.tenable.com/blogs/tenable-blog-548d2213-b14f-4795-a028-c85ba38381df/foreshadow-speculative-execution-attack-targets-intel-sgx

https://www.amd.com/en/corporate/security-updates

https://www.tenable.com/plugins/nessus/111703

https://www.trendmicro.com/vinfo/in/security/news/vulnerabilities-and-exploits/foreshadow-l1tf-intel-processor-vulnerabilities-what-you-need-to-know

 

Standard
Uncategorized

more on Intel-SA-00161

Re: https://firmwaresecurity.com/2018/08/15/intel-sa-00161-l1-terminal-fault-l1tf-speculative-execution-side-channel-attack-foreshadow/

https://en.wikipedia.org/wiki/Foreshadow_(security_vulnerability)
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-3620.html
https://support.microsoft.com/en-us/help/4343909/windows-10-update-kb4343909
https://xenbits.xen.org/xsa/advisory-273.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF
https://blogs.oracle.com/oraclesecurity/intel-l1tf
https://cloud.google.com/blog/products/gcp/protecting-against-the-new-l1tf-speculative-vulnerabilities
https://kb.vmware.com/s/article/55636
https://blogs.vmware.com/security/2018/08/new-vmware-security-advisory-vmsa-2018-0022-and-updated-security-advisory-vmsa-2018-0019-1.html
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03874en_us
https://blog.rapid7.com/2018/08/14/patch-tuesday-august-2018/
https://lkml.org/lkml/2018/8/14/885
https://www.suse.com/support/kb/doc/?id=7023077
https://marc.info/?l=openbsd-tech&m=153431475429367&w=2

Standard