Intel to head into more trouble as researcher finds new loopholes

Intel Loopholes

Have you not upgraded your website to HTTPS yet? Upgrade NOW.

Google with its Chrome 68 update to show all HTTP websites as NOT SECURE. Avoid Google's penalty by installing an SSL Certificate. Get a DigiCert Standard SSL and secure your website at just $157/year. BUY NOW

ADVERTISEMENT
DAILY BRIEF
Get daily updates straight in your inbox.

In a video posted by a Finnish researcher at F-Secure, Harry Sintonen, has revealed shocking details about a new Intel loophole that he discovered in Intel’s new Active Management Technology (AMT). The new loophole gives colors to an IT security officer’s worst nightmares. It allows a hacker to gain access to the computer remotely.

AMT provides IT departments and managed service providers with the ability to better control their device fleets and maintain corporate-grade PCs by giving them a solution for remote access monitoring. This same AMT can be exploited by hackers in the new loophole found by Sintonen.

Outlining the process by which this can be achieved, Sintonen has said that a local intruder can start rebooting the targeted device, followed by entering the boot menu. While ideally an attacker would be stopped here since he wouldn’t know the BIOS password, in this situation he can use Intel’s Management Engine BIOS Extension and log in with the default password, “admin”, which, in most cases, remain unchanged by the user. This would allow the hacker to enable remote access and set AMT’s user opt-in to “None”, thus compromising the machine. The only other thing that would be left for the hacker to do would be to use the same network segment as the victim.

Related:

The successful exploitation of the Intel loophole can be completed by physically stealing the machine. And this is usually a cakewalk for a trained cyber criminal. To quote Harry Sintonen, this can be done in the following way: “Attackers have identified and located a target they wish to exploit. They approach the target in a public place – an airport, a café or a hotel lobby – and engage in an ‘evil maid’ scenario. Essentially, one attacker distracts the mark, while the other briefly gains access to his or her laptop. The attack doesn’t require a lot of time – the whole operation can take well under a minute to complete.”

Join our list

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

To combat the Intel loophole, the system provisioning process should be updated to make way for a strong password to be set for the AMT, or to have it dissolved altogether. IT should also ensure that the procedure has been followed in all machines that are in use. Apart from this, the device user should ensure that the device is left unguarded at no point of time; and if the user notices that the AMT password has been changed and set to an unknown value, he should consider the device as a suspect and initiate an incident response. Although so far no statement has been issued by Intel, users are advised to exercise caution when using their Intel-powered devices.

Source: myDrivers

Intel to head into more trouble as researcher finds new loopholes