Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43445
  • Total Topics: 16537
  • Online today: 3188
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 0
Guests: 3127
Total: 3127









Author Topic: Attackers Seek to Hack Hardware for Ultimate Control  (Read 2506 times)

0 Members and 2 Guests are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 776
  • KARMA: 117
  • Gender: Male
  • Pez
Attackers Seek to Hack Hardware for Ultimate Control
« on: 12. February 2016., 14:43:37 »
Attackers Seek to Hack Hardware for Ultimate Control



We are seeing interesting changes in how researchers and attackers are exploring methods to undermine systems and devices. Increasingly, the focus is on the hardware.

Vulnerability and exploit research is accelerating across the board with better tools, greater funding, and improved methods. As a result, more potential avenues of attack are being discovered and developed for hardware and the firmware that controls it.

Although it is difficult to exploit hardware, the interest in doing so continues to increase. The reason is simple: It is about control.

As security of software becomes more robust, attackers are looking in other areas for more powerful means to control systems. Hardware and firmware have a distinct advantage over software.

Modern computers are like a layered cake. Data is at the top, resting on software, virtual environments, operating systems, and finally firmware and hardware at the foundation. The lower you can access this technology stack, the more control you achieve over the system.Stack

There is an adage in cybersecurity: physical access trumps all. If attackers can get their hands on a computer and its components, they have an excellent chance of compromising the system. With control of hardware and firmware, attackers can mirror the system, install tools, swap elements, copy raw data, and test the system in a variety of ways. Such fundamental control can undermine the core trust of the device.



In theory, hacking hardware remotely can give similar advantages to attackers. Hardware attacks are incredibly difficult but ultimately very powerful if successful. They can bypass almost all security controls and detection capabilities rooted in software as well as remain persistent, resisting actions to evict and restore normal trust. Most modern security resides in software. Nowadays, applications and operating systems are the heavyweights and do most of the work to protect systems. Off-the-shelf security software is really just an application; many have special hooks to bind closer with the operating system. But they have limitations because they reside in the same layer as most of the attacks. Hardware and virtual environments residing underneath have a greater understanding of what is occurring above them and can significantly affect the visibility and capabilities of such protective software.

Controlling the hardware is a key advantage. For this reason, researchers and attackers will continue to accelerate their investment in undermining hardware and devices. Controlling hardware is difficult, however. It takes very particular expertise, patience, and time. Many attackers lack such characteristics, but a growing community of professional researchers, academia, nation-states, and organized criminals are willing to commit to the investment, driven by a variety of motivations.

In 2016 we will see more research, with some vulnerabilities discovered, but largely hardware hacking will remain outside the reach of most attackers. Hardware and device hacking will become even more prevalent with the growth of the Internet of Things—devices, sensors, appliances, and vehicles—but will also occur across the traditional landscape of PCs, networking equipment, and servers.

Hardware is the final frontier for those seeking to undermine security, and is the root of trust for those wishing to defend it. This is a battle for a prize that we, in the technology security industry, will be talking about for years to come.

Original article: https://blogs.mcafee.com/mcafee-labs/attackers-seek-to-hack-hardware-for-ultimate-control/
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info

Attackers Seek to Hack Hardware for Ultimate Control
« on: 12. February 2016., 14:43:37 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023