<div dir="ltr"><div dir="ltr"><div dir="ltr"><div>A talk by Trammell Hudson entitled Modchips of the State</div><div><a href="https://media.ccc.de/v/35c3-9597-modchips_of_the_state">https://media.ccc.de/v/35c3-9597-modchips_of_the_state</a></div><div><br></div><div><p style="margin:0px 0px 0.5em;text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;white-space:normal;box-sizing:border-box">Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these "modchips" and increase our trust in our systems.</p><span style="text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-family:"Estrangelo Edessa","Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;display:inline;white-space:normal;float:none;background-color:rgb(255,255,255)">
</span><p style="margin:0px 0px 0.5em;text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;white-space:normal;box-sizing:border-box">We don't know how much of the Bloomberg story about hardware implants installed in Supermicro servers shipped to Apple and Amazon is true, nor do we know the story behind the story and the reasons for the vehement denials by all the parties involved.</p><span style="text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-family:"Estrangelo Edessa","Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;display:inline;white-space:normal;float:none;background-color:rgb(255,255,255)">
</span><p style="margin:0px 0px 0.5em;text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;white-space:normal;box-sizing:border-box">However, a technical assessment of details of the describe implants reveals that a supply chain attack on the hardware is definitely possible, that the capabilities of the BMC can be used to bypass OS protections, and that there are means to access the BMC that would not necessarily generate readily identified network traffic.</p><span style="text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-family:"Estrangelo Edessa","Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;display:inline;white-space:normal;float:none;background-color:rgb(255,255,255)">
</span><p style="margin:0px 0px 0.5em;text-align:left;color:rgb(0,0,0);text-transform:none;text-indent:0px;letter-spacing:normal;font-size:14px;font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;word-spacing:0px;white-space:normal;box-sizing:border-box">In this talk we'll examine the design of a proof of concept SPI bus hardware implant that has similar capabilities to those described in the Bloomberg/Supermicro article as well as some countermeasures that we can use to try to detect these "modchips" and increase our trust in our systems.</p><b></b><i></i><u></u><sub></sub><sup></sup><strike></strike><br></div></div></div></div><br><div class="gmail_quote"><div dir="ltr">On Sun, 21 Oct 2018 at 01:57, Chris Samuel <<a href="mailto:chris@csamuel.org">chris@csamuel.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid">On Thursday, 4 October 2018 11:47:17 PM AEDT Douglas Eadline wrote:<br>
<br>
> <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" target="_blank" rel="noreferrer">https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies</a><br>
<br>
So two weeks on and it looks like this wasn't real, and I've read somewhere<br>
(though I can't find the reference now) that this isn't the first time for the<br>
person who wrote that article. A lot of people wrote about how this sort<br>
of attack doesn't really make sense, there are far easier ways to do this<br>
sort of thing (nobbled BMC firmware probably being one of the easiest)<br>
and without the problems of possibly thousands of SM boxes trying to<br>
ping back to a CnC server to set off alarms in a host of companies.<br>
<br>
This sums it up nicely..<br>
<br>
<a href="https://twitter.com/SwiftOnSecurity/status/1053102057245286401" target="_blank" rel="noreferrer">https://twitter.com/SwiftOnSecurity/status/1053102057245286401</a><br>
<br>
Two weeks since Bloomberg claimed Supermicro servers were backdoored by Chinese spying chips.<br>
No Evidence Whatsoever shows these claims real.<br>
All companies angrily deny it to Congress.<br>
Senior US intelligence including Rob Joyce refute it.<br>
It’s time.<br>
It’s over.<br>
This is not true.<br>
<br>
-- <br>
Chris Samuel : <a href="http://www.csamuel.org/" target="_blank" rel="noreferrer">http://www.csamuel.org/</a> : Melbourne, VIC<br>
<br>
<br>
<br>
_______________________________________________<br>
Beowulf mailing list, <a href="mailto:Beowulf@beowulf.org" target="_blank">Beowulf@beowulf.org</a> sponsored by Penguin Computing<br>
To change your subscription (digest mode or unsubscribe) visit <a href="http://www.beowulf.org/mailman/listinfo/beowulf" target="_blank" rel="noreferrer">http://www.beowulf.org/mailman/listinfo/beowulf</a><br>
</blockquote></div>