Dark Mode
Capec-638 Detail
Altered Component Firmware
Detailed Software Hardware Likelihood: Low Typical Severity: Very High
Parents: 452
Threats: T79 T287 T337 T391 T406
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-638 | capec | https://capec.mitre.org/data/definitions/638.html | |
| T1542.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1542/002 | Pre-OS Boot:Component Firmware |
| REF-664 | reference_from_CAPEC | https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064459/Equation_group_questions_and_answers.pdf | EQUATION GROUP: QUESTIONS AND ANSWERS (1.5), 2015--02, Kaspersky Lab HQ |
| REF-665 | reference_from_CAPEC | https://blog.pjhoodsco.org/hard-drive-firmware-implant-iratemonk/ | Preston Hood, Hard Drive Firmware Implant IRATEMONK, 2014--10---26, PJHoodsCo Blog |
| REF-666 | reference_from_CAPEC | https://www.schneier.com/blog/archives/2014/01/iratemonk_nsa_e.html | Bruce Schneier, IRATEMONK: NSA Exploit of the Day, 2014--01---31, Schneier on Security |
Explore
-
Select Target: The adversary searches for a suitable target to attack, such as government and/or private industry organizations.
-
Identify Components: After selecting a target, the adversary determines whether a vulnerable component, such as a specific make and model of a HDD, is contained within the target system.
| Techniques |
|---|
| Conduct reconnaissance to determine potential targets to exploit. |
| Techniques |
|---|
| [Remote Access Vector] The adversary gains remote access to the target, typically via additional malware, and explores the system to determine hardware components that are being leveraged. |
| [Physical Access Vector] The adversary intercepts components in transit and determines if the component is vulnerable to attack. |
Experiment
-
Optional: Create Payload: If not using an already existing payload, the adversary creates their own to be executed at defined intervals and upon system boot processes. This payload may then be tested on the target system or a test system to confirm its functionality.
Exploit
-
Insert Firmware Altering Malware: Once a vulnerable component has been identified, the adversary leverages known malware tools to infect the component's firmware and drop the payload within the component's MBR. This allows the adversary to maintain persistence on the target and execute the payload without being detected.
| Techniques |
|---|
| The adversary inserts the firmware altering malware on the target component, via the use of known malware tools. |
| [Physical Access Vector] The adversary then sends the component to its original intended destination, where it will be installed onto a victim system. |
- Advanced knowledge about the target component's firmware
- Advanced knowledge about Master Boot Records (MBR)
- Advanced knowledge about tools used to insert firmware altering malware.
- Advanced knowledge about component shipments to the target organization.
- Manufacturer source code for hardware components.
- Malware tools used to insert malware and payload onto target component.
- Either remote or physical access to the target component.
| Low | High | Medium |
|---|---|---|
| Ability to leverage known malware tools to infect target system and insert firmware altering malware/payload | ||
| Ability to intercept components in transit. | ||
| Ability to create malicious payload to be executed from MBR. |
| Authorization | Access Control | Authentication | Confidentiality |
|---|---|---|---|
| Gain Privileges | Read Data | Gain Privileges | Read Data |
| Execute Unauthorized Commands | Modify Data | Execute Unauthorized Commands | Modify Data |
| Bypass Protection Mechanism | Bypass Protection Mechanism | ||
| Hide Activities | Hide Activities |
- In 2014, the Equation group was observed levering known malware tools to conduct component firmware alteration attacks against hard drives. In total, 12 HDD categories were shown to be vulnerable from manufacturers such as Western Digital, HGST, Samsung, and Seagate. Because of their complexity, only a few victims were targeted by these attacks. [REF-664]