#[1]alternate [2]alternate [3]alternate [4]alternate

  IFRAME: [5]https://www.googletagmanager.com/ns.html?id=GTM-NLXNPCQ

[6]Ars Technica

  [7]←
  [8]→
  0
  ____________________

    * [9]Biz & IT
    * [10]Tech
    * [11]Science
    * [12]Policy
    * [13]Cars
    * [14]Gaming & Culture
    * [15]Newsletter
    * [16]Forums
    * [17]Subscribe
    * [18]Store

[19]View Full Site

    * [20]light
    * [21]dark

[22]Log in

[23]Register

[24]Security

Millions of PC motherboards were sold with a firmware backdoor

Hidden code in many Gigabyte motherboards invisibly and insecurely downloads
programs.

  by [25]Andy Greenberg, wired.com - Jun 1, 2023 1:04 pm UTC
  [26]153

  [gigabyte-listing-800x533.jpg]
  BeeBright/Getty Images

  Hiding malicious programs in a computer’s UEFI firmware, the
  deep-seated code that tells a PC how to load its operating system, has
  become an insidious trick in the toolkit of stealthy hackers. But when
  a motherboard manufacturer installs its own hidden backdoor in the
  firmware of millions of computers—and doesn’t even put a proper lock on
  that hidden back entrance—they’re practically doing hackers’ work for
  them.

  Researchers at firmware-focused cybersecurity company Eclypsium
  revealed today that they’ve discovered a hidden mechanism in the
  firmware of motherboards sold by the Taiwanese manufacturer Gigabyte,
  whose components are commonly used in gaming PCs and other
  high-performance computers. Whenever a computer with the affected
  Gigabyte motherboard restarts, Eclypsium found, code within the
  motherboard’s firmware invisibly initiates an updater program that runs
  on the computer and in turn downloads and executes another piece of
  software.

  While Eclypsium says the hidden code is meant to be an innocuous tool
  to keep the motherboard’s firmware updated, researchers found that it’s
  implemented insecurely, potentially allowing the mechanism to be
  hijacked and used to install malware instead of Gigabyte’s intended
  program. And because the updater program is triggered from the
  computer’s firmware, outside its operating system, it’s tough for users
  to remove or even discover.

  [wired-logo.png] “If you have one of these machines, you have to worry
  about the fact that it’s basically grabbing something from the Internet
  and running it without you being involved, and hasn’t done any of this
  securely,” says John Loucaides, who leads strategy and research at
  Eclypsium. “The concept of going underneath the end user and taking
  over their machine doesn’t sit well with most people.”

  In its [27]blog post about the research, Eclypsium lists 271 models of
  Gigabyte motherboards that researchers say are affected. Loucaides adds
  that users who want to see which motherboard their computer uses can
  check by going to “Start” in Windows and then “System Information.”

  [28]Expand full story

  Page: 1 [29]2 [30]Next →

  [31]Reader comments 153
  Advertisement
   [32]← Older Story [33]Newer Story →

  [34][condenast-logo.png]
  CNMN Collection
  WIRED Media Group
  © 2023 Condé Nast. All rights reserved. Use of and/or registration on
  any portion of this site constitutes acceptance of our [35]User
  Agreement (updated 1/1/20) and [36]Privacy Policy and Cookie Statement
  (updated 1/1/20) and [37]Ars Technica Addendum (effective 8/21/2018).
  Ars may earn compensation on sales from links on this site. [38]Read
  our affiliate link policy.
  [39]Your California Privacy Rights | Do Not Sell My Personal
  Information
  The material on this site may not be reproduced, distributed,
  transmitted, cached or otherwise used, except with the prior written
  permission of Condé Nast.
  [40]Ad Choices

References

  1. http://feeds.arstechnica.com/arstechnica/index
  2. https://arstechnica.com/wp-json/wp/v2/posts/1943487
  3. https://arstechnica.com/wp-json/oembed/1.0/embed?url=https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/
  4. https://arstechnica.com/wp-json/oembed/1.0/embed?url=https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/&format=xml
  5. https://www.googletagmanager.com/ns.html?id=GTM-NLXNPCQ
  6. https://arstechnica.com/
  7. https://arstechnica.com/science/2023/06/ars-frontiers-recap-what-happens-to-developers-when-ai-can-code/
  8. https://arstechnica.com/science/2023/06/the-atlantic-hurricane-season-has-begun-what-we-know-and-what-we-dont/
  9. https://arstechnica.com/information-technology/
 10. https://arstechnica.com/gadgets/
 11. https://arstechnica.com/science/
 12. https://arstechnica.com/tech-policy/
 13. https://arstechnica.com/cars/
 14. https://arstechnica.com/gaming/
 15. https://arstechnica.com/newsletters/
 16. https://arstechnica.com/civis/
 17. https://arstechnica.com/store/product/subscriptions/
 18. https://arstechnica.com/store/
 19. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/?view=grid
 20. https://arstechnica.com/?mobile_theme=light
 21. https://arstechnica.com/?mobile_theme=dark
 22. https://arstechnica.com/civis/login?_xfRedirect=/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/
 23. https://arstechnica.com/civis/register/
 24. https://arstechnica.com/security/
 25. https://arstechnica.com/author/wired-com/
 26. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/?comments=1
 27. https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/
 28. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/
 29. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/2/
 30. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/2/
 31. https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/?comments=1
 32. https://arstechnica.com/science/2023/06/ars-frontiers-recap-what-happens-to-developers-when-ai-can-code/
 33. https://arstechnica.com/science/2023/06/the-atlantic-hurricane-season-has-begun-what-we-know-and-what-we-dont/
 34. http://www.condenast.com/
 35. https://www.condenast.com/user-agreement/
 36. https://www.condenast.com/privacy-policy/
 37. https://arstechnica.com/amendment-to-conde-nast-user-agreement-privacy-policy/
 38. https://arstechnica.com/affiliate-link-policy/
 39. https://www.condenast.com/privacy-policy/#california
 40. https://www.condenast.com/online-behavioral-advertising-oba-and-how-to-opt-out-of-oba/#clickheretoreadmoreaboutonlinebehavioraladvertising(oba)