Warning of the risk of businesses being attacked through micro-chips attached to servers
Information that China implanted spy chips into servers of large US corporations in recent days has made many businesses unable to panic. Although it is still not possible to determine whether this information is real or not, according to SecurityBox, a network security company in Vietnam, the penetration of important information systems of businesses and organizations through Micro chips are absolutely possible.
According to the security experts' analysis of the SecurityBox, the process of building the board is very complicated, including the steps of design, experience and finally machining.
In order to secure the technology, firms often use two separate suppliers for circuit making and circuit welding in the process of board machining. The board machining units only get the printed board file, the information about the overall design of the board is very small. Therefore, mounting the chip on the board is difficult to implement.
To do this, before machining the board machining lines must reach the motherboard design or the design of the modified boards to be able to decompile the printed board and adjust Edit and add new design with microchip. Although this is very difficult, theoretically, if the area of intervention and on-board impact is not too large, it can still be done.
Microchip mounting is a form of attack that is difficult to detect, stable and highly effective by easily penetrating important information systems of large corporations or government organizations.
The SecurityBox offers two microchip microchip attack scenarios.
The first scenario: Microchip attacks organizations and businesses thanks to the ability to open back ports.
Microchip with extremely large script can perform memory control, network connection or firmware loading operations on the server which can provide functional support code for microchip. This microchip can insert malicious code into the operating system kernel because it can interact or replace BMC - Baseboard Management Controller. BMC is an embedded microcontroller in the motherboard to manage the interface between the system management software and the hardware platform.
If the Firewall and security systems do not prevent, microchip can download and execute malware.
This option requires very high technical requirements.
Second scenario: Microchip creates vulnerabilities that can exploit remote systems to take control.
Microchip has the ability to interact or replace BMC so it can handle data streams. Microchip with a special data structure format will trigger a designed feature that has a vulnerability that allows remote exploitation in it. Meanwhile, hackers only need to rely on specially structured data to be able to detect servers that contain microchips and exploit.
SecurityBox adds that it is not too complicated to detect whether the boards are microchip-mounted but need to cooperate with hardware manufacturers. Then, only the difference between the design of the motherboard and the finished machined board can be found.
See more:
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replaced
- Cold boot, an attack technique 10 years ago can crack the encryption of most PCs today
- Facebook was attacked, more than 50 million user accounts are at risk of being leaked
You should read it
- Future Macs won't use Intel chips?
- Samsung users have been fed up with the Exynos chip
- New chip technology can enhance quantum computing
- Samsung will launch a 1TB memory chip for smartphones, will it appear on Galaxy S10?
- Secret chips can be hidden in the device to spy on and hijack smartphones
- Intel i7-9700K chip reaches 5.5Ghz speed on all 8 cores, with water cooled
- Intel revealed new AI chips to compete with Nvidia's GPUs
- China produces x86 chips close to AMD server processors
May be interested
- Is VirtualBox safe or a security risk?virtualbox is a popular open source virtualization program used by individuals and businesses. if you've tried creating virtual machines on a windows or linux system, you've probably used this tool already.
- How to Format a micro SD cardmicro sd is a very small memory card, often used to add more memory to devices such as cameras, gps devices and mobile phones. in most cases, you can format a micro sd card using the device's built-in commands. however, you can also format the micro sd card right on your windows or mac computer.
- QNAP provides an emergency warning about NAS device attack trends, showing how to secure NAS devicesnas (network attached storage), also known as a network hard drive, is a device that is installed to serve the needs of storing or accessing data.
- Install the patch immediately for Windows Server & Windows 10 to run IIS so that it will not be attacked by DOSwindows server and windows 10 servers running internet information services (iis) easily become targets of denial of service (dos) attacks.
- Warning: Watching TV for too long can increase the risk of blood clotswatching tv for too long can increase your risk of developing blood clots twice, according to a warning from researchers.
- Difference between HDMI, Mini HDMI and Micro HDMIthe hdmi standard has become the mainstay of the post-hd digital age. while new versions have appeared and have significantly increased speed, the connectors have remained the same as the first introduction.
- How to choose a microphone on Windows 11while using windows 11, you may need to set up audio input switching between several microphones that are connected to your pc for work or play purposes.
- 26 'unimaginable' images of micro-apartments in the worldhere are 26 photos of micro-apartments all over the world, which will surprise you and wonder why they are able to do so?
- What is a 2-head Micro USB charging cable? Advantages and disadvantages of USB cableswhat is a 2-head micro usb charging cable? what are the advantages and disadvantages of usb cables? one of the most popular types of micro usb cables today.
- Warning of zero-day vulnerabilities in window manager on PCrecently, kaspersky global security company has discovered a zero-day vulnerability in the desktop window manager, warning of the risk of taking control of the system.