ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Lenovo - if it's on your network, you ARE breached.

    Scheduled Pinned Locked Moved IT Discussion
    lenovosecurity
    93 Posts 14 Posters 11.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Dashrender
      last edited by

      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

      @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

      @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

      Junkware on the other hand - sure. Lenovo's own crapware to help them deploy their own drivers, etc. This was after the SF issue, so again, it's not known if actual malware was distributed this way.

      That's malware. Plain and simple. When deployed via a rootkit. And more importantly, there was a rootkit!!

      Is it a windows rootkit? Or is it using built in tech by MS and BIOS/UEFI makers as a deployment method?

      It's MS encouraged UEFI rootkit. The rootkit was in firmware. It was only activated against Windows before getting caught. Linux would have been rooted the same though.

      Should it have? MS specifically has hooks for working with these BIOS/UEFI hooks, do any Linux distorts do this?

      Unless you're saying it was taking advantage of a security flaw in Windows and Linux that isn't/can't be patched?

      AFAIK this particular exploit, being on the firmware, could make changes to any OS sitting on top of it, similar to getting a rootkit on your hypervisor would do. Windows hooks would help make that easier, but I don't believe that it is required to make it possible.

      DashrenderD 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @Dashrender
        last edited by

        @dashrender said in Lenovo - if it's on your network, you ARE breached.:

        Let's break the topic of SMM out on its own and I'll participate as I'm able.

        Maybe make a new one.

        1 Reply Last reply Reply Quote 0
        • travisdh1T
          travisdh1 @Dashrender
          last edited by

          @dashrender said in Lenovo - if it's on your network, you ARE breached.:

          Let's break the topic of SMM out on its own and I'll participate as I'm able.

          This is why I felt we needed a thread dedicated to just how bad Lenovo actually is. While many threads preceded it, more will follow!

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @travisdh1
            last edited by

            @travisdh1 said in Lenovo - if it's on your network, you ARE breached.:

            @dashrender said in Lenovo - if it's on your network, you ARE breached.:

            Let's break the topic of SMM out on its own and I'll participate as I'm able.

            This is why I felt we needed a thread dedicated to just how bad Lenovo actually is. While many threads preceded it, more will follow!

            Right, and it needs to be collected because, as we've seen already, later breaches often cover up earlier ones.

            1 Reply Last reply Reply Quote 1
            • DashrenderD
              Dashrender
              last edited by

              Sure, but the SMM issue is really outside of Lenovo because all PC makers can use it.

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @Dashrender
                last edited by

                @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                Sure, but the SMM issue is really outside of Lenovo because all PC makers can use it.

                Can use it and do use it are different issues, but both are important as well.

                DashrenderD 1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender @scottalanmiller
                  last edited by

                  @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                  @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                  Sure, but the SMM issue is really outside of Lenovo because all PC makers can use it.

                  Can use it and do use it are different issues, but both are important as well.

                  Many do use it to deploy Compu Trace as previously mentioned.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @scottalanmiller
                    last edited by

                    @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                    @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                    @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                    @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                    @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                    @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                    Junkware on the other hand - sure. Lenovo's own crapware to help them deploy their own drivers, etc. This was after the SF issue, so again, it's not known if actual malware was distributed this way.

                    That's malware. Plain and simple. When deployed via a rootkit. And more importantly, there was a rootkit!!

                    Is it a windows rootkit? Or is it using built in tech by MS and BIOS/UEFI makers as a deployment method?

                    It's MS encouraged UEFI rootkit. The rootkit was in firmware. It was only activated against Windows before getting caught. Linux would have been rooted the same though.

                    Should it have? MS specifically has hooks for working with these BIOS/UEFI hooks, do any Linux distorts do this?

                    Unless you're saying it was taking advantage of a security flaw in Windows and Linux that isn't/can't be patched?

                    AFAIK this particular exploit, being on the firmware, could make changes to any OS sitting on top of it, similar to getting a rootkit on your hypervisor would do. Windows hooks would help make that easier, but I don't believe that it is required to make it possible.

                    That's just it though - this is NOT an exploit. This is a system design, a design specifically in the BIOS/UEFI.

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @Dashrender
                      last edited by

                      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                      @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                      @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                      @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                      @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                      Junkware on the other hand - sure. Lenovo's own crapware to help them deploy their own drivers, etc. This was after the SF issue, so again, it's not known if actual malware was distributed this way.

                      That's malware. Plain and simple. When deployed via a rootkit. And more importantly, there was a rootkit!!

                      Is it a windows rootkit? Or is it using built in tech by MS and BIOS/UEFI makers as a deployment method?

                      It's MS encouraged UEFI rootkit. The rootkit was in firmware. It was only activated against Windows before getting caught. Linux would have been rooted the same though.

                      Should it have? MS specifically has hooks for working with these BIOS/UEFI hooks, do any Linux distorts do this?

                      Unless you're saying it was taking advantage of a security flaw in Windows and Linux that isn't/can't be patched?

                      AFAIK this particular exploit, being on the firmware, could make changes to any OS sitting on top of it, similar to getting a rootkit on your hypervisor would do. Windows hooks would help make that easier, but I don't believe that it is required to make it possible.

                      That's just it though - this is NOT an exploit. This is a system design, a design specifically in the BIOS/UEFI.

                      Obviously that the system is designed that way has no bearing on it being an exploit.

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                        @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                        @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                        Sure, but the SMM issue is really outside of Lenovo because all PC makers can use it.

                        Can use it and do use it are different issues, but both are important as well.

                        Many do use it to deploy Compu Trace as previously mentioned.

                        Right, as an exploit as is very clear. All kinds of well intentioned software can be exploited by bad actors. In fact, at the base of it, all code is based on chips and languages that were intended for good but exploited for other purposes.

                        https://threatpost.com/millions-of-pcs-affected-by-mysterious-computrace-backdoor-2/107700/

                        DashrenderD 1 Reply Last reply Reply Quote 2
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                          @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                          @scottalanmiller said in Lenovo - if it's on your network, you ARE breached.:

                          @dashrender said in Lenovo - if it's on your network, you ARE breached.:

                          Sure, but the SMM issue is really outside of Lenovo because all PC makers can use it.

                          Can use it and do use it are different issues, but both are important as well.

                          Many do use it to deploy Compu Trace as previously mentioned.

                          Right, as an exploit as is very clear. All kinds of well intentioned software can be exploited by bad actors. In fact, at the base of it, all code is based on chips and languages that were intended for good but exploited for other purposes.

                          https://threatpost.com/millions-of-pcs-affected-by-mysterious-computrace-backdoor-2/107700/

                          Wow, I hadn't heard that before, thanks.

                          1 Reply Last reply Reply Quote 0
                          • travisdh1T
                            travisdh1
                            last edited by

                            Finally got a blog post up on this.

                            https://travisdh1.net/lenovo

                            dbeatoD 1 Reply Last reply Reply Quote 4
                            • dbeatoD
                              dbeato @travisdh1
                              last edited by

                              @travisdh1 Great article and read.

                              1 Reply Last reply Reply Quote 1
                              • T
                                Texkonc
                                last edited by

                                THis will be shared with the teams tomorrow.

                                1 Reply Last reply Reply Quote 2
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  https://www.theregister.co.uk/2019/08/23/lenovo_solution_centre_cve_2019_6177/

                                  1 Reply Last reply Reply Quote 1
                                  • travisdh1T
                                    travisdh1
                                    last edited by travisdh1

                                    Posting so @Obsolesce will see this thread.

                                    ObsolesceO 1 Reply Last reply Reply Quote 0
                                    • ObsolesceO
                                      Obsolesce @travisdh1
                                      last edited by Obsolesce

                                      @travisdh1 said in Lenovo - if it's on your network, you ARE breached.:

                                      Posting so @Obsolesce will see this thread.

                                      Thanks sport, I didn't see it over and over again here the last few years and missed all the thousands of media articles thrown all over the place.

                                      travisdh1T 1 Reply Last reply Reply Quote 1
                                      • travisdh1T
                                        travisdh1 @Obsolesce
                                        last edited by

                                        @Obsolesce said in Lenovo - if it's on your network, you ARE breached.:

                                        @travisdh1 said in Lenovo - if it's on your network, you ARE breached.:

                                        Posting so @Obsolesce will see this thread.

                                        Thanks sport, I didn't see it over and over again here the last few years and missed all the thousands of media articles thrown all over the place.

                                        Yeah, and I get that you didn't pick the vendor. Exactly like I would never choose to sell Lenovo, yet that's most of what is sold through work.

                                        1 Reply Last reply Reply Quote 0
                                        • DustinB3403D
                                          DustinB3403
                                          last edited by DustinB3403

                                          Just reading this article here and this is in it. . .

                                          Still, while Torvalds likes the XPS 13, he's also fond of the latest Lenovo X1 Carbon, HP Spectre 13 x360, and last year's Lenovo Yoga 900. Me? I like the XPS 13 Developer Editor. The price tag, which for the model I reviewed was $1949.99, may keep you from reaching for your credit card.

                                          1 Reply Last reply Reply Quote 0
                                          • Emad RE
                                            Emad R
                                            last edited by Emad R

                                            FYI Lenovo options are very cheap in the MENA region, so it's flooded there cause we are very price-sensitive people
                                            (I'm starting to be white a bit... did I just say price-sensitive)

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 1 / 5
                                            • First post
                                              Last post