Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

Zeedox

Resident Canadian
Dec 1, 2020
9,026
7,074
113
Canada's Ocean Playground

The attack—dubbed LogoFAIL by the researchers who devised it—is notable for the relative ease in carrying it out, the breadth of both consumer- and enterprise-grade models that are susceptible, and the high level of control it gains over them. In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that can’t be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intel’s Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections.

What kills me is I know the guy who came up with this idea over 20 years ago and when he presented it at a security symposium the first people to ask for an official briefing were Washington dudes.
 
  • Like
Reactions: Gomez Adams
The problem with security at large is that people keep thinking its fine once it's set.

It's not. It never has been.

If you don't constantly change the way you secure something, it's only a matter of time before someone finds a way around it.

It's simply astounding that people keep building a security suite of any kind, figure it's perfect and then leave it alone like it's going to last forever.

Inevitably, years down the road when it gets exploited and screws up half the planet, those same people have the unmitigated gall to look surprised.
 
  • Like
Reactions: Zeedox