Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Portables Hardware

BIOS "Rootkit" Preloaded In 60% of New Laptops 236

Keldrin_1 writes "Researchers Alfredo Ortega and Anibal Sacco, from Core Security Technologies, have discovered a vulnerability in the 'Computrace LoJack for Laptops' software. This is a BIOS-level application that calls home for instructions in case the laptop is ever lost or stolen. However, what the application considers 'home' is subject to change. This allows the creation of malware capable of 'infecting the BIOS with persistent code that survive reboots and reflashing attempts.' Computers from Dell, Lenovo, HP, Toshiba, Asus, and others may be affected."
This discussion has been archived. No new comments can be posted.

BIOS "Rootkit" Preloaded In 60% of New Laptops

Comments Filter:
  • Re:Problem solved (Score:4, Informative)

    by alen ( 225700 ) on Friday July 31, 2009 @11:59AM (#28897239)

    http://store.lojackforlaptops.com/store/absolute/DisplayProductDetailsPage/productID.104509100 [lojackforlaptops.com]

    Congrats, there is a Mac version available as well. PC's and Mac's are all the same parts made by the same slaves chained together. there is a few companies in the world that make a basic computer and then Dell, HP, Apple and others add a few things and brand it for themselves.

  • by Daniel_Staal ( 609844 ) <DStaal@usa.net> on Friday July 31, 2009 @12:01PM (#28897265)

    With the rest of the BIOS code, in the special flash-pram on the motherboard designed especially to store just that code.

  • by leuk_he ( 194174 ) on Friday July 31, 2009 @12:09PM (#28897385) Homepage Journal

    From the Lojack compatibility list [absolute.com] here is a list of company:

              ASUS, Dell Fujitsu, GammaTech, Gateway, GD Itronix, Getac, HP, Lenovo,,Motion, Panasonic, Toshiba

    You can find a list of models on the "bios compatibility list"

  • Re:60%? Really? (Score:2, Informative)

    by scout-247 ( 1127737 ) on Friday July 31, 2009 @12:17PM (#28897461)
    You'll have to load your laptop into BIOS, it's one of the options listed. I set the option to completely disable it. That doesn't mean that someone could somehow modify code to turn it on, and report it to their site.
  • by Anonymous Coward on Friday July 31, 2009 @12:26PM (#28897567)

    Computrace comes loaded in the bios of all of my Dell Latitudes. It is "inactive" until you turn it on in the BIOS. Once activated, there is no way to disable it.

    There is a one time license fee to register the Computrace machine on their website. It uses IP based location. Windows will recognize the computrace hardware and install a "Generic USB HUB" driver for it (thanks MS). It must also interface with WMI in some way, as the website will also pull up some details on the computer's specs.

    Once you flag the machine as stolen, Computrace (the company) tries to track it down. If they are unable to return your laptop within a certain amount of time (30 days I believe) they pay out 70% of the value of the laptop.

  • by value_added ( 719364 ) on Friday July 31, 2009 @12:32PM (#28897649)

    Where exactly is the code stored, that survives reboots?

    Start here [howstuffworks.com]. For more info, you can read the Wiki article [wikipedia.org].

    Alternatively, try opening your computer and actually looking at what's inside. ;-)

  • Re:60%? Really? (Score:5, Informative)

    by QuantumRiff ( 120817 ) on Friday July 31, 2009 @12:36PM (#28897727)

    Disable only works if the product was never activated. if the BIOS is set to active, AND the client software on the machine contacts the servers for Computrace, and verifies it should be licensed, then it "flips a switch" in that BIOS setting, and you can NEVER disable it again.

    They need to write to the software, or else the software will always try to contact them, and then anyone could track any laptop with a supeana, ruining their business model.. Instead, it has to be "turned on".

    Also, this software in the BIOS does not actually contact anyone directly. All the BIOS level crap does is forcibly try to re-install the agent software under windows. This could get ugly, if you update the BIOS, to try to force it to install a different program every time someone reloads windows...

    Of course, I wonder what happens if I buy an "off lease" laptop, that was at one point activated...

  • FUD FOR THE WIN! (Score:5, Informative)

    by BitZtream ( 692029 ) on Friday July 31, 2009 @12:43PM (#28897837)

    First off, the 'feature' comes on a lot of laptops. Doesn't mean its enabled. You have to request it to be enabled in order for it to come from factory with it actually turned on.

    If you don't turn it on, it doesn't do anything, no phone home, no remote wipe, no tracking.

    Guess what, same thing applies to Blackberrys, and iPhones, and cars with LoJack that have remote shutoff. For every feature there is a potential risk, thats the way the world works.

    If you want the potential to remotely locate/track and wipe a laptop or PC, then you also get the potential that someone else can do it as well.

  • Re:60%? Really? (Score:1, Informative)

    by Anonymous Coward on Friday July 31, 2009 @12:44PM (#28897851)
    When doing our research we couldn't find a notebook *without* the Computrace agent.

    You didn't look very hard then, did you? Acer don't have CompuTrace [absolute.com] and finding one of their notebooks is hardly challenging. According to the most recent data [displaysearch.com] from NPD's DisplaySearch, Acer has the second largest unit-volume market share, with 16% of the global notebook shipments (excluding netbooks) to themselves.

    Obviously you know that, because as the ZDNet article based on your presentation stated, fully 40% of all new notebooks don't include Computrace. With nearly half of notebooks not including the technology, it's obviously pretty darned easy to find a notebook without Computrace. Polemic statements like that still don't do your credibility any good, though.
  • by Khyber ( 864651 ) <techkitsune@gmail.com> on Friday July 31, 2009 @12:53PM (#28898027) Homepage Journal

    They have every DV/TC-model of HP Laptop listed - I used to specifically work on all DV/TC/NC/NX models, I've NEVER ONCE seen this in BIOS during any of my repairs. NEVER. Also, this software was never listed in part of HP's troubleshooting guides, and that usually means that feature is not there.

    I rebooted my laptop (DV9000, full featured loaded with every possible thing offered) and this 'rootkit' in BIOS is nowhere to be found, at all. Not on my friend's DV2000. Not on the new TC4400 I have in my art room.

  • Re:It is time (Score:1, Informative)

    by Anonymous Coward on Friday July 31, 2009 @01:01PM (#28898147)

    I take it your not a BIOS developer? Because that answer is completely WRONG.

    BIOS controls the base hardware, and is different on different machines. SOME need LBA some dont, some have higher/lower bus speeds than others. It changes frequently (not as frequent as an OS, but frequent) to support new hardware such as Faster ram support, larger HD support, etc.

    Non changing BIOS is not a reality. Period.

  • Re:It is time (Score:3, Informative)

    by tepples ( 727027 ) <tepples.gmail@com> on Friday July 31, 2009 @01:07PM (#28898233) Homepage Journal

    Fire the guy. BIOS do the same function on every computer and are a very simple program of a few K. Bugs in there are totally avoidable.

    No, they need to be adapted per chipset, especially for things like ACPI.

  • Re:FUD FOR THE WIN! (Score:3, Informative)

    by GMFTatsujin ( 239569 ) on Friday July 31, 2009 @01:10PM (#28898265) Homepage

    Exactly right. The company that made LoJack lobbied for the feature to be installed, but they want you to pay for it to be activated. If you don't give them money, it's dormant.

    Now, if somebody hacked or appropriated their activation scheme, or compelled the company to activate it without your knowledge, that would be a cause for concern.

  • Once upon a time... (Score:4, Informative)

    by DrYak ( 748999 ) on Friday July 31, 2009 @01:11PM (#28898307) Homepage

    Well, once upon a time, that was the case :

    In case of bug you needed either to move the BIOS chip to a separate flasher, or at least use a hardware switch on the motherboard to switch between 5v and 12v to enable BIOS chip flashing.

    Nowadays, even Windows applications can write to the BIOS without any peculiar form of control. No switch at all involved.
    BIOS rootkits were just bound to happen. What makes it even easier for rootkits, is that 90% of all PC uses the same brands of BIOS and those BIOS are designed in a modular fashion making it easy to add a "rootkit" modules without needing the re-create a whole new BIOS (see example of how to add an embed FreeDOS inside an Award BIOS).

    That pretty much stupid : Most motherboard have a couple of bugs fixed during the first couple of months. Then there's mostly no need to reflash the BIOS, except for supporting newer CPUs, etc... which would require opening the case and accessing the motherboard anyway. But for the whole lifetime of the BIOS, it remains completely writeable even from user-space application from within highly insecure OSes.

    Hardware "write-protection" switches for BIOSes should be reintroduced. Simple fix for a simple problem.
    Instead you can stay sure that the manufacturers and Microsoft are going to require several layers of TPM and similar forms of DRM in BIOS which won't even guaranty that BIOSes would be protected from bugs.

  • by Anonymusing ( 1450747 ) on Friday July 31, 2009 @01:58PM (#28899015)

    Maybe it's available "optionally" on all those models?

    Or maybe it's really really good at hiding itself from you....

  • by Anonymous Coward on Friday July 31, 2009 @02:00PM (#28899039)

    Datasheet of my old BIOS FLASH:

    http://www.atmel.com/dyn/resources/prod_documents/DOC1017.PDF (pdf datasheet)

    >In the AT49F002(N)(T), once the boot block programming lockout feature is enabled, the contents of the boot block are permanent and cannot be changed.

  • Re:60%? Really? (Score:3, Informative)

    by Lord Ender ( 156273 ) on Friday July 31, 2009 @02:00PM (#28899043) Homepage

    60% may be vulnerable, but it is a bald faced lie to say that 60% are preloaded with a rootkit.

  • Re:Problem solved (Score:4, Informative)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Friday July 31, 2009 @02:39PM (#28899699) Homepage

    Actually this could be built into EFI. Apple don't, but if a laptop manufacturer wanted to they could. It's even easier than BIOS - an EFI ROM is a structured filesystem containing all the drivers and commands required to boot.. things like the display and keyboard drivers. Adding this software could be done after the fact without even having to touch the original code.

  • by camg188 ( 932324 ) on Friday July 31, 2009 @03:34PM (#28900543)
    From one of the links in the article:

    While an attacker would have to already have compromised a system to insert malicious code into the BIOS, the attack prevents a defender from easily deleting an attacker's program or rootkit, the researchers said. "You can remove the hard drive, trash it, and even reinstall the operating system," Sacco said. "This will still reinstall the rootkit."
    ...
    BIOS attacks can be prevented by using the jumpers on many motherboards to block writing to the chips that store the system's instructions. In addition, some hardware security technologies, such as the Trusted Computing platform, could be used to check the integrity of the BIOS, preventing changes.

  • Re:It is time (Score:3, Informative)

    by adolf ( 21054 ) <flodadolf@gmail.com> on Friday July 31, 2009 @04:09PM (#28901219) Journal

    Not everything is flash-based, yaknow.

    Once upon a time, I had a 32x Plextor SCSI CD-ROM reader, back when such a thing was still a trendy thing to have for ripping audio CDs, which was generally problematic back then.

    It worked pretty well, but eventually Plextor made a new firmware for it that improved a few things. They mailed it out to me for free, via USPS. After the package showed up, I found a small, square EEPROM inside of a static-resistant carrier and, IIRC, a brief instruction sheet.

    The process was simple: Pull the drive, turn it over, remove old chip, insert new chip, reassemble, and done.

    I mean, sheesh: BIOS wasn't always flashable, either, yaknow -- it used to be contained on socketed ROMs that could be swapped around fairly easily.

  • Re:60%? Really? (Score:3, Informative)

    by adolf ( 21054 ) <flodadolf@gmail.com> on Friday July 31, 2009 @09:46PM (#28904865) Journal

    No, I don't think I can disable it. I can only issue an instruction to a computer which is described as disabling the function permanently, but that doesn't exactly mean anything important.

    Here's the scenario:

    I "disable" it, the appropriate bits are written into the flash ROM on the motherboard, and it appears to be disabled.

    Later, something else comes along, and writes different bits into the flash ROM. And then it's not disabled anymore.

    (And, whatever the case, the default is "off," which should at least forestall any white hat usage of the thing without user intervention. Emphasis on "should" and "white hat". It's Really Fucking Important to maintain a certain level of mistrust when it comes to considering such matters.)

    And, whatever the case: I don't think it even matters at that point. The thing still needs some software support in order to work, and the package which includes that software can fairly easily modify the BIOS to include whatever small bit of code the programmer decides should be there.

    There's well-documented, reliable, and easy methods for inserting your own code into BIOS to initialize a SCSI card, perform a network boot, or change the Energy Star logo, and there's no reason at all why these same methods cannot be used purposes other than those I just listed -- including, of course, quietly inserting malicious backdoors.

  • Re:60%? Really? (Score:2, Informative)

    by cachimaster ( 127194 ) on Saturday August 01, 2009 @03:17PM (#28911031)

    Please read the paper. The configuration is saved in NVRAM and there are many ways to reverse it. We even found a software-only way.

    Never say never.

The one day you'd sell your soul for something, souls are a glut.

Working...