Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, March 7, 2023

BlackLotus UEFI bootkit: Myth confirmed

WeLiveSecurity

As already mentioned, the bootkit has been sold on underground forums since at least October 6th, 2022. At this point, we have not been able to identify, from our telemetry, the exact distribution channel used to deploy the bootkit to victims. The low number of BlackLotus samples we have been able to obtain, both from public sources and our telemetry, leads us to believe that not many threat actors have started using it yet.

The goal of the installer is clear – it’s responsible for disabling Windows security features such as BitLocker disk encryption and HVCI, and for deployment of multiple files, including the malicious bootkit, to the ESP. Once finished, it reboots the compromised machine to let the dropped files do their job – to make sure the self-signed UEFI bootkit will be silently executed on every system start, regardless of UEFI Secure Boot protection status.

ArsTechnica:

Researchers on Wednesday announced a major cybersecurity find—the world’s first-known instance of real-world malware that can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.

Because the UEFI is the first thing to run when a computer is turned on, it influences the OS, security apps, and all other software that follows. These traits make the UEFI the perfect place to launch malware. When successful, UEFI bootkits disable OS security mechanisms and ensure that a computer remains infected with stealthy malware that runs at the kernel mode or user mode, even after the operating system is reinstalled or a hard drive is replaced.

The ultimate takeaway is that UEFI bootkit BlackLotus is able to install itself on up-to-date systems using the latest Windows version with secure boot enabled.  

TheRegister:

Once BlackLotus exploits CVE-2022-21894 and turns off the system's security tools, it deploys a kernel driver and an HTTP downloader. The kernel driver, among other things, protects the bootkit files from removal, while the HTTP downloader communicates with the command-and-control server and executes payloads.

And while the researchers don't attribute the malware to a particular gang or nation-state group, they do note that the BlackLotus installers they analyzed won't proceed if the compromised computer is located in Armenia, Belarus, Kazakhstan, Moldova, Romania, Russia, and Ukraine.

This is a really tough sort of attack to protect against. If Microsoft deployed the trivial solution (simply flagging the vulnerable boot files as untrustworthy), it may brick every machine with an outdated UEFI. The exploit also uses BatonDrop, discovered by Wack0 back in August.

GitHub:

Windows Boot Applications allow the truncatememory setting to remove blocks of memory containing "persistent" ranges of serialised data from the memory map, leading to Secure Boot bypass. 

The attacker needs to ensure the serialised Secure Boot Policy is allocated above a known physical address.

This issue can be used to dump BitLocker keys (where Secure Boot is used for integrity validation). 

No known vulnerable boot application has been revoked yet. Revocation would cause all existing Windows installation/recovery media, and old backups, to fail to boot.

Tuesday, February 14, 2023

Zero-day Webkit vulnerability (CVE-2023-23529) affecting Apple ecosystem

SecurityWeek:

Apple on Monday announced the release of updates for macOS, iOS and Safari, and they all include a WebKit patch for a new zero-day vulnerability tracked as CVE-2023-23529.

In response to these types of attacks, Apple last year announced Lockdown Mode, a feature that should significantly limit the ability to use sophisticated exploits against its customers. 

Apple:

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

HackerNews:

WebKit flaws are also notable for the fact that they impact every third-party web browser that's available for iOS and iPadOS owing to Apple's restrictions that require browser vendors to use the same rendering framework.

Also addressed by the company is a use-after-free issue in the Kernel (CVE-2023-23514) that could permit a rogue app to execute arbitrary code with the highest privileges.

Credited with reporting the issue are Xinru Chi of Pangu Lab and Ned Williamson of Google Project Zero. Apple said it resolved the vulnerability with improved memory management.

The updates are available for the following devices:

  • iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later
  • Macs running macOS Ventura, macOS Big Sur, and macOS Monterey\
From a message I received from my institution:
Apple released emergency security updates on Monday 02/13/2023 to address (among other things) a zero-day vulnerability tracked as CVE-2023-23529, which pertains to a WebKit confusion issue that could be exploited to trigger OS crashes and gain code execution on compromised devices.




The sleep mask that solved my sleep problems

As previously reported on this blog, I've been actively seeking ways to unwind and, in particular, improve my quality of sleep. I've...