nothing more on Bloomberg SuperMicro story

The numbers of on this twitter poll are interesting:

I’ll be trying to avoid info on the Bloomberg story until something of substance shows up, there’s lots of mainstream media coverage of that story…

Hypervisor From Scratch – Part 4: Address Translation Using Extended Page Table (EPT)

https://rayanfam.com/topics/hypervisor-from-scratch-part-4/

Microsoft Ephemeral OS: limited public preview

Last week at Microsoft Ignite, we launched Ultra SSD, a new industry leading high-performance disk type for IO intensive workloads. Adding to that, today we are delighted to share the limited preview of Ephemeral OS Disk, a new type of OS disk created directly on the host node, providing local disk performance and faster boot/reset time. Ephemeral OS Disk is supported for all virtual machines (VM) and virtual machine scale sets (VMSS). This offering is based on your feedback to provide a lower cost, higher performant OS disk for stateless applications, which enable them to quickly deploy the VMs and reset them to its original state.[…]

https://azure.microsoft.com/en-us/blog/ephemeral-os-disk-limited-public-preview/

Announcing Ultra SSD – the next generation of Azure Disks technology (preview)

 

more on SuperMicro Bloomberg story

Re: https://firmwaresecurity.com/2018/10/04/bloomberg-the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-u-s-companies/

SuperMicro response:
https://www.supermicro.com/newsroom/pressreleases/2018/press181004_Bloomberg.cfm

Apple response:
https://www.apple.com/newsroom/2018/10/what-businessweek-got-wrong-about-apple/

Amazon.com response:
https://aws.amazon.com/blogs/security/setting-the-record-straight-on-bloomberg-businessweeks-erroneous-article/

More info:

Making sense of the Supermicro motherboard attack


https://blog.senr.io/blog/impervious-implants-splintery-supply-chains
https://motherboard.vice.com/en_us/article/gye8w4/chinese-supply-chain-hack-apple-bloomberg

Bloomberg: The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

[…]There are two ways for spies to alter the guts of computer equipment.
One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden.
The other method involves seeding changes from the very beginning.[…]

https://twitter.com/qrs/status/1047788385425940480

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

https://twitter.com/qrs/status/1047788391939682309

 

 

Positive Technologies researcher finds vulnerability enabling disclosure of Intel ME encryption keys

http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html

https://twitter.com/qrs/status/1047380728428806145

Eclypsium on LoJax UEFI malware

Re: https://firmwaresecurity.com/2018/09/27/apt28-malware-lojax-uses-uefi-rootkit/, Eclypsium has a new blog post on this malware:

https://blog.eclypsium.com/2018/10/01/uefi-attacks-in-the-wild/

Open Source Firmware Conference: videos uploaded

UEFI workshops at BSidesPDX!

Exciting, there are two workshops at BSidesPDX in Portland Oregon next month:

Detecting Evil Maid Firmware Attacks
https://bsidespdx.org/events/2018/workshops.html#Evil%20Maid

UEFI and CHIPSEC development for Security Researchers
https://bsidespdx.org/events/2018/workshops.html#Chipsec

PS: If you’re in town, there’s also the Portland Retro Gaming Expo, starting a few days earlier:
https://www.oregoncc.org/events/2018/10/portland-retro-gaming-expo-2018
http://www.retrogamingexpo.com/

ACM SIG Arch: Reflections on trusting SGX

Reflections on trusting SGX
by Mark Silberstein
Sep 25, 2018

The security community will remember the year of 2018 as the year of speculative execution attacks. Meltdown and Spectre, the recent Foreshadow (L1TF in Intel’s terminology), and their variants demonstrate how the immense processor design complexity, perpetual drive for higher performance, and subtle hardware-software interactions — all collude to create a major system security earthquake that is shaking the whole industry. Foreshadow stands out in that it wreaks havoc on Intel SGX, Intel’s recent instruction set extension for building trusted execution environments, which has been envisioned as a stronghold of security in future computing systems. In this blog I highlight the important differences between Foreshadow and other speculative execution attacks, and raise a few questions that require much more than just a technical solution.[…]

Reflections on trusting SGX

 

GNU/HardenedLinux translates ‘Platform Firmware Security Defense…’ ebook to Chinese

Re: https://firmwaresecurity.com/2018/07/28/new-ebook-platform-firmware-security-defense-for-enterprise-system-administrators-and-blue-teams/

The book “Platform Firmware Security Defense for Enterprise System Administrators and Blue Teams“, which Paul English of PreOS security wrote, introducing the concept of firmware security for the system administrator audience:

https://preossec.com/Newsletter-Q3-2018/
https://preossec.com/products/ebook-download

has been translated to Chinese, by the GNU Hardened Linux project!

https://github.com/hardenedlinux/hardenedlinux_translations/tree/master/platform_firmware_security_defense

more info:

https://hardenedlinux.github.io/

 

HowToForge: Building and flashing a secured AOSP build with verified boot and separate lockscreen password for the Nexus 5X

[…]This tutorial aims to provide detailed instructions on how to solve these caveats, building and flashing AOSP for the Nexus 5X with verified boot and using separate lockscreen/encryption secrets.

https://www.howtoforge.com/tutorial/building-and-flashing-a-secured-aosp-build-with-verified-boot-and-separate-lockscreen-password-for-the-nexus-5x/

APT28 malware LoJax uses UEFI rootkit

 

https://thehackernews.com/2018/09/uefi-rootkit-malware.html?m=1

https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/

https://www.bleepingcomputer.com/news/security/apt28-uses-lojax-first-uefi-rootkit-seen-in-the-wild/

CVE-2018-12169: Tianocore UEFI: Unauthenticated Firmware Chain-of-Trust Bypass

https://twitter.com/qrs/status/1044157466349633537

https://twitter.com/qrs/status/1044157473882591233

“The issue was reported by Trammell Hudson”

https://edk2-docs.gitbooks.io/security-advisory/content/unauthenticated-firmware-chain-of-trust-bypass.html

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12169

https://nvd.nist.gov/vuln/detail/CVE-2018-12169

https://exchange.xforce.ibmcloud.com/vulnerabilities/150223