Home Tech HP Wolf: Not just software assaults; hackers are coming for enterprise hardware,...

HP Wolf: Not just software assaults; hackers are coming for enterprise hardware, too

25
0
HP Wolf: Not just software assaults; hackers are coming for enterprise hardware, too

August 5, 2024 1:00 AM

                <img width="750" height="422" src="https://venturebeat.com/wp-content/uploads/2024/08/HP-Wolf.jpeg?w=750" alt="VentureBeat/Ideogram"/>

VentureBeat/Ideogram

Be part of our every day and weekly newsletters for essentially the most in model updates and abnormal hiss on trade-leading AI protection. Be taught More

Nowadays’s enterprises are software-focused and software-driven, which map that noteworthy of the emphasis of cybersecurity is on software, too. 

Nonetheless the hardware on which that software runs is also just as intriguing to attackers. In actuality, threat actors are an increasing sort of targeting physical present chains and tampering with instrument hardware and firmware integrity, drawing dread from enterprise leaders, according to a brand current file from HP Wolf Security.

Particularly, one in five companies had been impacted by assaults on hardware present chains, and an alarming 91% of IT and security resolution makers assume that nation-allege threat actors will target physical PCs, laptops, printers and other devices. 

“If an attacker compromises a instrument at the firmware or hardware layer, they’ll establish unparalleled visibility and retain a watch on over all the things that happens on that machine,” stated Alex Holland, main threat researcher at HP Security Lab. “Just bear in mind what that would admire care for if it happens to the CEO’s laptop laptop.”

‘Blind and unequipped’

HP Wolf launched the preliminary shrimp print of its ongoing study into physical platform security — per a ogle of 800 IT and security resolution-makers — sooner than leading cybersecurity conference Dark Hat this week. 

Amongst the findings: 

  • Virtually one in five (19%) organizations had been impacted by nation-allege actors targeting physical PC, laptop laptop or printer present chains.
  • Bigger than half of (51%) of respondents aren’t in a position to own a study whether or no longer or no longer PCs, laptops or printer hardware and firmware had been tampered with while within the manufacturing facility or in transit.
  • Roughly one-third (35%) assume that they or others they know had been impacted by nation-allege actors attempting to insert malicious hardware or firmware into devices.
  • 63% mediate the next main nation-allege attack will involve poisoning hardware present chains to sneak in malware.
  • 78% squawk the distinction on software and hardware present chain security will develop as attackers strive and infect devices within the manufacturing facility or in transit. 
  • 77% file that they desire a capability to own a study hardware integrity to mitigate instrument tampering throughout delivery.

“Organizations truly feel blind and unequipped,” stated Holland. “They don’t own the visibility and ability with a goal to detect whether or no longer they’ve been tampered with.”

Denial of availability, instrument tampering

There are many ways attackers can disrupt the hardware present chain — the first being denial of availability, Holland explained. On this scenario, threat actors will commence ransomware campaigns in opposition to a producing facility to prevent devices from being assembled and extend delivery, which could per chance own destructive ripple outcomes. 

In other instances, threat actors will infiltrate manufacturing facility infrastructure to target particular devices and modify hardware substances, thus weakening firmware configurations. For occasion, they’ll flip off security aspects. Devices are additionally intercepted while in transit, squawk at delivery ports and other intermediary locations.

“Hundreds of leaders are an increasing sort of smitten by the threat of instrument tampering,” stated Holland. “This speaks to this blind allege: You’ve ordered one thing from the manufacturing facility but can’t repeat whether or no longer it modified into built as supposed.”

Firmware and hardware assaults are in particular no longer easy on fable of they take a seat below the working gadget — whereas most security tools take a seat internal working techniques (equivalent to House windows), Holland explained. 

“If an attacker is prepared to compromise firmware, it’s truly subtle to detect using commonplace security tools,” stated Holland. “It poses a proper trouble for IT security groups with a goal to detect low-level threats in opposition to hardware and firmware.”

Extra, firmware vulnerabilities are notoriously subtle to repair. With in model PCs, for occasion, firmware is stored on a separate flash storage on a motherboard, no longer on the pressure, Holland explained. This means that inserted malware rests in firmware memory in a separate chip. 

So, IT groups can’t simply re-portray a machine or replace a arduous pressure to get rid of an infection, Holland successfully-known. They decide on to manually intervene, reflashing the compromised firmware with a identified appropriate copy, which is “cumbersome to abolish.” 

“It’s subtle to detect, subtle to remediate,” stated Holland. “Visibility is melancholy.”

Peaceable with the password trouble?

Password hygiene is one in every of those things hammered into all of our heads this order day — but apparently it’s tranquil messy when it involves organising hardware. 

“There’s truly harmful password hygiene spherical managing firmware configurations,” stated Holland. “It’s one in every of the few areas of IT where it’s tranquil in model.” 

 » …
Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here