Tag Archive for: lenovo

Your Lenovo Is Vulnerable to a New Malware Attack


Image for article titled Your Lenovo Is Vulnerable to a New Malware Attack

Photo: Lukmanazis (Shutterstock)

Lenovo laptop users need to install critical security patches right away to fix several major vulnerabilities that leave their device open to dangerous malware attacks.

Why are Lenovo laptops vulnerable?

According to a recent Lenovo security bulletin, there are multiple bugs present in the Unified Extensible Firmware Interface (UEFI) in over 100 of the manufacturer’s laptop models that hackers could use to write and install modified firmware with hidden malware, which in turn opens the device—and the data on it—to further exploitation. Given the nature of the bugs, it would be virtually impossible to find and remove the modified firmware or the hidden malware installed on an infected device.

How can a hacker exploit my Lenovo’s security?

While serious, a hacker would need local administrator-level access to successfully exploit the UEFI vulnerabilities, which is only possible with either physical access to an affected device or remote access through a virtual desktop program. Anyone with cursory cybersecurity knowledge will recognize the threat such bugs could pose to enterprise-level Lenovo users and corporations that let employees use work machines remotely, but according to the list of affected devices, the vulnerabilities only appear on consumer-level Lenovo laptops where it’s far less likely for some random threat actor to achieve the necessary access.

As Ars Technica points out, there are only a few known instances of UEFI firmware hijackings: The infamous Trickbot malware; the “Lojax” malware written by Russian state hacker group Sednit; and a custom UEFI the cybersecurity firm Kaspersky discovered in 2018, though the only two targets were political figures from Asia.

So do I need to worry?

While it’s improbable to exploit these bugs in the wild, there’s still cause for concern for the average user. Hackers often dupe unsuspecting users into installing remote desktop software on their computers without realizing it, usually through phishing scams, fake ads, or modified download files. In some cases, hackers can even elevate their user privileges to install apps and firmware remotely—and the millions of unpatched Lenovo laptops…

Source…

Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?


Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?

Getty Images

Lenovo has released security updates for more than 100 laptop models to fix critical vulnerabilities that make it possible for advanced hackers to surreptitiously install malicious firmware that can be next to impossible to remove or, in some cases, to detect.

Three vulnerabilities affecting more than 1 million laptops can give hackers the ability to modify a computer’s UEFI. Short for Unified Extensible Firmware Interface, the UEFI is the software that bridges a computer’s device firmware with its operating system. As the first piece of software to run when virtually any modern machine is turned on, it’s the initial link in the security chain. Because the UEFI resides in a flash chip on the motherboard, infections are difficult to detect and even harder to remove.

Oh, no

Two of the vulnerabilities—tracked as CVE-2021-3971 and CVE-2021-3972—reside in UEFI firmware drivers intended for use only during the manufacturing process of Lenovo consumer notebooks. Lenovo engineers inadvertently included the drivers in the production BIOS images without being properly deactivated. Hackers can exploit these buggy drivers to disable protections, including UEFI secure boot, BIOS control register bits, and protected range register, which are baked into the serial peripheral interface (SPI) and designed to prevent unauthorized changes to the firmware it runs.

After discovering and analyzing the vulnerabilities, researchers from security firm ESET found a third vulnerability, CVE-2021-3970. It allows hackers to run malicious firmware when a machine is put into system management mode, a high-privilege operating mode typically used by hardware manufacturers for low-level system management.

“Based on the description, those are all pretty ‘oh no’ sorts of attacks for sufficiently advanced attackers,” Trammel Hudson, a security researcher specializing in firmware hacks, told Ars. “Bypassing SPI flash permissions is pretty bad.”

He said the severity may be lessened by protections such as BootGuard, which is designed to prevent unauthorized people…

Source…

Lenovo Chromebook Flex 5 Review: The Flex 5 is a solid mid-range Chromebook for those on a tight budget – Notebooks


Source…

How To Completely Remove Bitdefender Total Security and Internet Security