Headlines

“Gigabyte Patches Security Hole with BIOS Updates for Motherboards”

"Gigabyte Patches Security Hole with BIOS Updates for Motherboards"motherboard,BIOS,security,update,Gigabyte

Gigabyte Motherboards Backdoor: BIOS Updates Released

Gigabyte, the Taiwanese computer components maker, has released BIOS updates to fix a backdoor issue that was recently discovered in hundreds of its motherboards. The firmware of over 270 Gigabyte motherboards has been reported to have a Windows binary that drops at boot-up, enabling anyone to fetch and execute a payload from Gigabyte’s servers. This mechanism is associated with the Gigabyte App Center.

While there is no evidence that this backdoor has been used for malicious purposes, it is known that threat actors use these kinds of tools in attacks. The firmware and hardware security firm, Eclypsium, revealed that it is not clear whether the backdoor was the result of a malicious insider, a supply chain attack, or if there was a breach of Gigabyte’s servers.

Gigabyte has now addressed the vulnerability with updated BIOS, mitigating potential risks and implementing more stringent security checks during system boot. The firmware update ensures that during the boot process, there are strict file validation processes for files downloaded from remote servers and verifies remote server certificates to prevent attackers from inserting malicious code on boot up.

What Action Should Affected Users Take?

Gigabyte has announced that the BIOS update is available on its official website, and Intel 700/600 and AMD 500/400 series Beta BIOS have been tested and uploaded after conducting thorough testing and validation of the firmware on the Gigabyte motherboards. The BIOS updates for Intel 500/400 and AMD 600-series chipset motherboards, and the BIOS for earlier motherboards, were also released late last week.

End-users and organizations using Gigabyte motherboards should check Eclypsium’s list of over 270 affected motherboard models. If the motherboard is on the affected list, users should head to Gigabyte’s support website to review and download the applicable BIOS update released after June 1, 2023.

Editorial

This report highlights a regrettable state of affairs that concerns computer component makers having backdoors in their hardware. Firmware and hardware security companies are increasingly reporting these findings, which raises a fundamental question about trust in device manufacturers’ security. How can we cope with the fact that vital hardware components have faults that can be abused and have backdoors that are susceptible to exploits?

To secure our digital infrastructure effectively, it is imperative to have transparency and accountability in device manufacturing. It is recommended that vendors should regularly review their hardware security mechanisms also and share details transparently with users and security experts. Additionally, it is necessary to carry out comprehensive power analysis, fault injection, and other security audits to identify any hidden vulnerabilities that can be exploited by threat actors. Addressing backdoors and security-related issues must be taken seriously by technology vendors to preserve public trust and long-term customer loyalty.

Advice

As a precautionary measure, users are advised to regularly monitor motherboard vendors’ websites for firmware updates. Once updates are available, end-users should download and install them immediately. Additionally, it is recommended that users leverage security solutions that continuously monitor hardware activity to detect and alert anomalies, breaches, or malicious behavior. Security solutions that use Machine Learning and AI-based algorithms should also be preferred over traditional signature-based antivirus and anti-malware solutions.

Motherboardmotherboard,BIOS,security,update,Gigabyte


"Gigabyte Patches Security Hole with BIOS Updates for Motherboards"
<< photo by Craig Dennis >>

You might want to read !