• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 27th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance

Hidden Kill Switch Identified in Controversial Intel ME controller chip

August 30th, 2017 Uzair Amir Security, Privacy, Surveillance, Technology News 0 comments
Hidden Kill Switch Identified in Controversial Intel ME controller chip
Share on FacebookShare on Twitter

Europe’s leading cyber-security firm Positive Technologies’ security researchers have a bad news for Intel users. They have detected a secret configuration setting or kill switch that disables Intel Management Engine (ME) 11 chip.

This chip comprises of a microcontroller, and its task is to control CPU, so if it gets disabled then the device will become open to grave security risk. The flaw was identified in May when a vulnerability in the Active Management Technology used by Intel was identified. This is the same firmware application that the Intel Me chip has.

More: Critical Vulnerabilities Found in Pre-Installed Dell Software

The flawed hardware is harvesting an “undocumented master controller” inside which the Electronic Frontier Foundation (EFF) referred to as a ‘security hazard.’ ME chip requires a Platform Controller Hub chip to function along with other integrated peripherals, and its job is to handle the majority of the data that travels between the processor and the external devices. This is how the chip is capable of accessing the data on the host computer and therefore when it is compromised it starts serving as a backdoor and allows an attacker to gain full control of the device.

Already there have been attempts to disable ME chip, but these have remained restricted to preventing the computer from booting or crashing the computer system totally but to no avail because ME components have been cleverly integrated by Intel into computer’s key processes, e.g., initialization, power management, and processor’s booting.

Intel ME system is an entirely different processor embedded in Intel’s CPUs, and it has no link with the main CPU as it has a separate Operating System, hardware bus driver, memory manager and file system, etc. It also has full access to various sensitive system components like system memory, keyboard, and video network. Therefore, it can easily access and obtain data as well as crucial control components of a computer, and if ME chip is disabled, then the computer will stop functioning.

The defect was believed to be fixed to some extent using ME Cleaner, but the risk will not be eliminated because of the way the chip has been designed. It has “irremovable environment with an obscure signed proprietary firmware, with full network and memory access, which poses a serious security threat,” read the chip’s configuration information.

However, researchers Dmitry Sklyarov, Mark Ermolov, and Maxim Goryachy from Positive Technologies have now identified a method to turn off the risk factor in the Intel Me chip by accessing a configuration file and setting the undocumented High Assurance Platform or HAP bit to 1. HAP is an IT security structure that was developed by the National Security Agency in the US.

[fullsquaread][/fullsquaread]

As per the information of Positive Technologies’ researchers, government agencies often try to eliminate or at least reduce the probability of unauthorized access and HAP’s impact on Boot Guard is yet unknown but it might provide valuable insights into the issue. Boot Guard is the boot process verification system from Intel.

In response to the issue related with ME Chip, Intel’s spokesperson stated that: “In response to requests from customers with specialized requirements, we sometimes explore the modification or disabling of certain features. In this case, the modifications were made at the request of equipment manufacturers in support of their customer’s evaluation of the US government’s ‘High Assurance Platform’ program. These modifications underwent a limited validation cycle and are not an officially supported configuration.”

Intel also stated that it doesn’t design backdoors for allowing access to its products and it never participates in any scheme that affects the security of its technology. However, the flaw is real and cyber criminals are now gearing up to exploit the vulnerabilities in Intel Me chips as the flaws will let them avoid firewalls and steal information using the AMTs Serial-over-LAN interface.

Via: The Register
Source: PTSecurity

  • Tags
  • backdoor
  • Computer
  • Intel
  • internet
  • Privacy
  • security
  • Spying
  • Surveillance
  • Technology
Facebook Twitter LinkedIn Pinterest
Previous article New Ransomware Email Scam Using FBI and IRS as Bait
Next article Electronics retail giant CeX hacked; data of 2 million customers stolen
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
TikTok vulnerability allowed hackers to access users' phone numbers

TikTok vulnerability allowed hackers to access users' phone numbers

Why you should never use free a VPN

Why you should never use free a VPN

Watch out as new Android malware spreads through WhatsApp

Watch out as new Android malware spreads through WhatsApp

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
TikTok vulnerability allowed hackers to access users' phone numbers
Security

TikTok vulnerability allowed hackers to access users' phone numbers

55
Why you should never use free a VPN
Drones

Why you should never use free a VPN

46
Watch out as new Android malware spreads through WhatsApp
Security

Watch out as new Android malware spreads through WhatsApp

419

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us