by verax » Thu 12 Mar 2015, 16:05:42
So I found out, there is a new NSA exploit that is entirely out of band and operates on the CPU microcode level. Basically these days with SoC (system on a chip) and the level of integration, the CPU is basically a computer in and of itself, and the CPU microcode processing is like a CPU within a CPU. This exploit can draws power from the CMOS battery of the computer, so even if computer is completely powered off and unplugged from the wall it will still work. It sends/recieves info completely out of band communications, so cannot be detected by something like wireshark or a firewall or any splitter or means of deep packet inspection. All of this can be triggered and remotely activated by the built in 3G capabilities found in any modern processor such as part of Intels (Anti Theft) measures. (For example, a Stingray like device can remotely activate the built in backdoors miles an miles away from your location - and this is for air gapped computers, for computer connected to the Internet it is much easier) Once activated, it backdoors the AES-NI component of the processor and instructing it to store all master encryption keys in a hidden section of the processor itself on the CPU chip. The CPU then communicates directly with the memory sticks (DMA in a direct memory access type of fashion) and ethernet/network adapters, bypassing the operating system, harddrive, and even much of the normal /regular motherboard itself. In essence, it is running its own computer within a computer, completely oblivious to the end user. Thus none of this can be detected in the works or caught in the act.
So sensitive information can be siphoned away via ethernet cable even when the computer is completely turned off and even when there is not a harddrive and not a working operating system. (here is to looking at you, TAILS) It is even capable of querying the memory directly to extract private key and encryption key information directly (no need for privilege escalation or zero day exploits since it does this out of band, at the microcode/firmware level outside the realms of any operating system) from RAM even after the computer has been shutdown (via cold boot attack methods), and then uploading that to a Echelon/NSA/CIA/CSS/etc station either via radio embedded on the motherboard (if you purchased your PC from amazon, etc), the via 3G chip on the chip, via high frequency acoustic channeling (a la Bad BIOS exploits) or via out of band via direct network ethernet adapter access (again bypassing completely the OS or rest of the motherboard) using its own secret encryption transport protocol (hint, not TCP/IP) or via very low frequency comms by modulating the power of the computer itself to communicate via the power outlet, /electric grid itself. It can then instruct the harddrive itself, via the controller , to storage large amounts of data that it wants to steal/siphon away in the service sectors of modern harddrives, (in encrypted format only accessible/decryptable by NSA of course) so that the end user cannot detect its existence at all (because the harddrive itself is compromised on the firmware/controller level and simply won't show it, and even if you could manage to somehow swap it out with another identical harddrive controller that was clean, you still couldn't read it because it would be encrypted and look nothing like but a high entropy bunch of randomness junk data)
Since all encryption software do not encrypt the master key in the RAM, and since all Full Disk Encryption software these days use the Intel AES-NI by default this means that it is trivial for the NSA to crack any encryption and any disk encryption, there is no brute force or cracking needed. This includes bitlocker, Truecrypt, PGP, bitmessage, HTTPS, OTR, etc etc etc
Also, once exploit is infected, it can be tasked to do other things like infect the controllers and firmware of devices on the same computer, like BIOS of the motherboard, like usb sticks, mouse, keyboard, monitors, graphics card, other PCI components, harddrives, web cams, and almost anything and everything, and yes even SD cards have firmware and micro controllers.... for example, it will essentially rootkit your usb keyboard and make it into a keylogger to record your keystrokes and mouse movements (thus attacking the "inputs" of the "end points" - the weakest point of failure other than being able to read minds to extract passwords) ... so if you accidentally use the now infected keyboard with an air gapped computer, the air gapped computer itself is now infected, and vice versa. Using this method it can essentially map an entire air gapped network of disconnected computers, like cisco cdp neighboor discovery but much more powerful... the air gap systems themselves become an interconnected web of exploits that have akin to swarm like intelligence and emergent properties and that sort of stuff.. It is capable of then hijacking your router and spreading to all the wifi connected /ethernet connected devices in your home, including any consoles, tv, smart car, etc etc... anything connected directly to a wall outlet is considered compromised.
Last edited by
verax on Thu 12 Mar 2015, 16:31:53, edited 3 times in total.