First Sednit UEFI Rootkit Unveiled
Jean-Ian Boutin | Senior Malware Researcher Frédéric Vachon | Malware Researcher
First Sednit UEFI Rootkit Unveiled Jean-Ian Boutin | Senior Malware - - PowerPoint PPT Presentation
First Sednit UEFI Rootkit Unveiled Jean-Ian Boutin | Senior Malware Researcher Frdric Vachon | Malware Researcher Frdric Vachon Malware Researcher @Freddrickk_ Agenda What is Sednit LoJack and Past research Compromised
Jean-Ian Boutin | Senior Malware Researcher Frédéric Vachon | Malware Researcher
Malware Researcher @Freddrickk_
Agenda
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Sednit
(AKA Fancy Bear/APT28/STRONTIUM/etc)
Example of phishing email
Absolute Software
Black Hat USA 2009
LoJack Architecture back then
Configuration file vulnerability
Configuration file vulnerability
Configuration file vulnerability
LoJax - Cat is out of the bag
Where is the attack?
Where is the attack?
Changed only configuration file?
Changed only configuration file?
The Balkans, Central and Eastern Europe victims
autochk.exe mechanism?
autochk.exe mechanism?
autochk.exe vs. autoche.exe
autochk.exe vs. autoche.exe
autochk.exe vs. autoche.exe
RWEverything
RWEverything
RWEverything
Did they get there?
ReWriter_read.exe
IOCTL code Description 0x22280c Writes to memory mapped I/O space 0x222808 Reads from memory mapped I/O space 0x222840 Reads a dword from given PCI Configuration Register 0x222834 Writes a byte to given PCI Configuration Register
ReWriter_read.exe
ReWriter_binary.exe
Unified Extensible Firmware Interface (UEFI)
Driver Execution Environment (DXE) Drivers
initialization
UEFI firmware layout
SPI flash memory layout
SPI flash memory layout
SPI flash memory layout
SPI flash memory layout
BIOS region layout
BIOS region layout
BIOS region layout
BIOS region layout
Parsing the firmware volumes
Ip4Dxe and DXE Core
space available
NtfsDxe and SmiFlash
Adding the rootkit
DXE Core volume
BIOS Write Protection Mechanisms
BIOS Write Protection Mechanisms
(BIOSWE) must be set to 1
BIOS Write Protection Mechanisms
(BIOSWE) must be set to 1
BIOS Write Protection Mechanisms
BIOS_CNTL
BIOS Write Protection Mechanisms
SMI handler sets BIOSWE to 0?
processors with hyper-threading enabled
BIOS Write Protection Mechanisms
introduces a fix for this issue
BIOS Write Protection Mechanisms
introduces a fix for this issue
ReWriter_Binary.exe
Writing process decision tree
Writing process decision tree
Writing process decision tree
Writing process decision tree
Let’s take a step back
Let’s take a step back
UEFI Rootkit
UEFI Rootkit Workflow
UEFI Rootkit Workflow
UEFI Rootkit Workflow
UEFI Rootkit: SecDxe
UEFI Rootkit: NTFS driver
UEFI Rootkit: Dropping files
UEFI Rootkit: Dropping files
UEFI Rootkit: Dropping files
UEFI Rootkit: Patching Windows Registry Value
UEFI Rootkit Workflow
Prevention
Remediation
Remediation
Conclusion
White paper available at welivesecurity.com @jiboutin @Freddrickk_