CAPEC-638: Altered Component Firmware

Detailed Stable 严重程度: Very High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary exploits systems features and/or improperly protected firmware of hardware components, such as Hard Disk Drives (HDD), with the goal of executing malicious code from within the component's Master Boot Record (MBR). Conducting this type of attack entails the adversary infecting the target with firmware altering malware, using known tools, and a payload. Once this malware is executed, the MBR is modified to include instructions to execute the payload at desired intervals and when the system is booted up. A successful attack will obtain persistence within the victim system even if the operating system is reinstalled and/or if the component is formatted or has its data erased.

执行流程

步骤 1 Explore

[Select Target] The adversary searches for a suitable target to attack, such as government and/or private industry organizations.

技术:
  • Conduct reconnaissance to determine potential targets to exploit.
步骤 2 Explore

[Identify Components] After selecting a target, the adversary determines whether a vulnerable component, such as a specific make and model of a HDD, is contained within the target system.

技术:
  • [Remote Access Vector] The adversary gains remote access to the target, typically via additional malware, and explores the system to determine hardware components that are being leveraged.
  • [Physical Access Vector] The adversary intercepts components in transit and determines if the component is vulnerable to attack.
步骤 3 Experiment

[Optional: Create Payload] If not using an already existing payload, the adversary creates their own to be executed at defined intervals and upon system boot processes. This payload may then be tested on the target system or a test system to confirm its functionality.

步骤 4 Exploit

[Insert Firmware Altering Malware] Once a vulnerable component has been identified, the adversary leverages known malware tools to infect the component's firmware and drop the payload within the component's MBR. This allows the adversary to maintain persistence on the target and execute the payload without being detected.

技术:
  • The adversary inserts the firmware altering malware on the target component, via the use of known malware tools.
  • [Physical Access Vector] The adversary then sends the component to its original intended destination, where it will be installed onto a victim system.

前提条件

  • Advanced knowledge about the target component's firmware
  • Advanced knowledge about Master Boot Records (MBR)
  • Advanced knowledge about tools used to insert firmware altering malware.
  • Advanced knowledge about component shipments to the target organization.

所需技能

High Ability to access and reverse engineer hardware component firmware.
High Ability to intercept components in transit.
Medium Ability to create malicious payload to be executed from MBR.
Low Ability to leverage known malware tools to infect target system and insert firmware altering malware/payload

所需资源

  • Manufacturer source code for hardware components.
  • Malware tools used to insert malware and payload onto target component.
  • Either remote or physical access to the target component.

后果影响

影响范围: Authentication Authorization

技术影响: Gain Privileges

影响范围: Confidentiality Access Control

技术影响: Read Data

缓解措施

Leverage hardware components known to not be susceptible to these types of attacks.

Implement hardware RAID infrastructure.

示例实例

In 2014, the Equation group was observed levering known malware tools to conduct component firmware alteration attacks against hard drives. In total, 12 HDD categories were shown to be vulnerable from manufacturers such as Western Digital, HGST, Samsung, and Seagate. Because of their complexity, only a few victims were targeted by these attacks. [REF-664]

分类映射

分类名称 条目ID 条目名称
ATTACK 1542.002 Pre-OS Boot:Component Firmware
关键信息

CAPEC ID: CAPEC-638

抽象级别: Detailed

状态: Stable

典型严重程度: Very High

攻击可能性: Low

相关攻击模式