Risky Business 67: Firmware pwnage

Security researcher John Heasman has learned it is possible to load undetectable rootkits into PCI devices, as we explain in this week's Risky Business security podcast.

This week’s Risky Business security podcast looks at firmware root kits with John Heasman from the US arm of NGS Software. Download it here:

Some time ago, John figured out how to plonk a root kit on to a PCI device.

As you can imagine, those sorts of root kits can be very difficult to detect and remove.

But it gets worse.

Newer research, due to be presented at BlackHat in Las Vegas, will show how the CPU on some PCI devices (like the chip on network devices designed to do TCP checksum calculations) can actually be used to run the root kits.

That means they never gets loaded into main memory. Try detecting that!

Read more on Security policy and user awareness

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close