Spy Chip embedded in SuperMicro motherboards?

Is there any truth to this?

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Supermicro, Apple, Amazon, and others have said there’s no truth to the story and have demanded a retraction of the story. Meanwhile one expert is saying it’s not a problem for Supermicro, it’s a problem for everyone including anywhere along the supply chain, not just the manufacturing.

My guess is the truth is somewhere in the middle. It’s likely a real thing but maybe not as prevalent as the Bloomberg article makes it out to be. I’m waiting for Bloomberg to present more evidence as is everyone else following the story. This could lead to some interesting legal battles for Bloomberg.

Dude! You need to spend more time on “lefty” websites…

Based on his inspection of the device, Appleboum determined that the telecom company’s server was modified at the factory where it was manufactured. He said that he was told by Western intelligence contacts that the device was made at a Supermicro subcontractor factory in Guangzhou, a port city in southeastern China. Guangzhou is 90 miles upstream from Shenzhen, dubbed the `Silicon Valley of Hardware,’ and home to giants such as Tencent Holdings Ltd. and Huawei Technologies Co. Ltd.

The tampered hardware was found in a facility that had large numbers of Supermicro servers, and the telecommunication company’s technicians couldn’t answer what kind of data was pulsing through the infected one, said Appleboum, who accompanied them for a visual inspection of the machine. It’s not clear if the telecommunications company contacted the FBI about the discovery. An FBI spokeswoman declined to comment on whether it was aware of the finding.

from https://www.bloomberg.com/news/articles/2018-10-09/new-evidence-of-hacked-supermicro-hardware-found-in-u-s-telecom

The motherboard failed the factory final assembly test. The “embedded chip” is a factory repair.

1 Like

Or, conversely …

1 Like

Very true …

Also, I’m sure there are many backdoors in many devices and software we have around. Notably, I recently found a backdoor some software we, at the space, were using for the RFID door locks. And there most likely are backdoors in our IP cameras, I will have to check the versions now.

For me, this is just a reminder that not all hardware or firmware is trustworthy.

1 Like

Working in the industry that specialises in this, we all concluded this article is BS/FUD.

There are numerous issues with the description on how the devices supposedly worked, and what they were like. First, the devices in question don’t even remotely have the pin counts required to tamper with memory between the CPU/RAM due to the way address space is randomized, so one can’t bank on certain instructions going to certain RAM modules.
Second, the BMCs can’t access hard disks and sensitive data when the machine is off. The BMCs only draw 5W, and even an SSD turning on would have noticeable power draw increases. The BMC may be on but that doesn’t mean the SATA/SAS/PCIe lanes are able to operate without the primary power initiated.
Third, in hardened targets like Apple, Amazon, and others BMC controllers can’t access the internet; they’re on isolated networks. They are not a good target to infect with this type of attack.
Fourth, the denials. Unlike an average company denying such an incident, Apple/Amazon/others are large public corporations. They aren’t allowed to lie to shareholders, and an incident of this magnitude would be one of particular scrutiny by various groups and auditing.
Fifth, the chip’s sheer size, for the capabilities advertised by bloomberg, would require significant advances in silicon lithography to do reliably (let along in quantity)

Sixth, and most important of all, is there isn’t a reason to use a hardware attack in this scenario. First, BMC firmwares have already been riddled with holes over the years and exploited to that effect. Additionally flashing a malicious firmware in the factory, if not just exploited after deployment, doesn’t require nearly the level of effort nor leave a physical trace. If you somehow tampered in the factory with a PCB, which is a massive undertaking, you could have spent far less time tampering with the firmware, not left a physical evidence trail, and ended up with far more spying capabilities.

Serve the Home does a good breakdown on the issues here: https://www.servethehome.com/investigating-implausible-bloomberg-supermicro-stories/

Another hardware security researcher has a good way of describing why this doesn’t make sense for this type of attack: " Installing malicious software on 10,000 systems is a system management problem. Installing malicious hardware on 10,000 systems starts out as an HR problem and moves on from there. It’s just not scalable." ( https://twitter.com/securelyfitz/status/1047942844738981889 ). These particualr reporters also refused to retract previous infosec articles that were widely found to be inaccurate, such as a pipeline explosion they claimed was an ICS malware (Archive.org used to bypass paywall): http://archive.is/tE1jJ
SANS’ response, one of the leading ICS security groups including the team I trained with: https://ics.sans.org/blog/2015/06/19/closing-the-case-on-the-reported-2008-russian-cyber-attack-on-the-btc-pipeline
In short, Bloomberg refused to retract the story even after it was found that the alleged attack vectors didn’t even exist, and that the forensics investigation confirmed the use of explosives at the site.

It’s not all even backdoors, but often just super shoddy firmware and software life-cycle processes. Often times one cannot think of a legitimate, non-malicious reason some software or hardware is acting the way it is, but often it’s just some idiot developer.
Case in point, I was doing hardware and software analysis of a certain unnamed Point of Sale system. I found what seemed to be a backdoor added to the device through a channel that should not be capable of code execution by basic kernel design. Turns out the developers did some convoluted thing and opened up these capabilities because they didn’t know any better.

As a final thought, and take this as you will, Bloomberg reporters (unlike most firms) gain bonuses if their reports “move markets.” Most reporters get paid the same regardless of what comes from an article, but Bloomberg reporters have an incentive for certain levels of sensationalism. Whether or not that contributed to this remains to be seen, and given the large amount of technical and practical issues that lend credence to this being FUD I put those forward first and use that to base my point of view but this certainly doesn’t help them.

Cheers,
-Jim

6 Likes

I’ve had the same desktop machine at home for almost 10 years now. Unlike machines previous it just didn’t seem to grow so long in the tooth so fast for a variety of reasons - my gaming fell off, it was a quad-core machine, and the realized performance gap between subsequent generations of Intel’s ix processors didn’t loom as large as during the mono-core era.

But two things have happened somewhat recently-ish to change this.

  • A few years ago the Row hammer vulnerability was discovered which is a hardware vulnerability that can be mitigated but not fully hardened against - the physical memory itself will always be vulnerable to this exploit
  • More recently, speculative execution exploits - Meltdown and Spectre - have been discovered; OS vendors and CPU vendors have released software and firmware patches to mitigate these, however …
    • There’s a performance hit since speculative execution is a significant percentage of the performance advantage modern hardware offers
    • intel was quite reluctant to patch my generation CPU - not sure if the microcode patch for first-gen i3/i5/i7 is out yet; future vulnerabilities are highly unlikely to see a patch if they’re even possible

As such, the desktop needs replacing sooner rather than later. Hardware, like software, has a shelf life not just in terms of performance but also in terms of security. Like computing appliances, manufacturer support is to a degree contingent upon present and future revenue potential.

1 Like

This reminds me that there’s efforts to increase trusting and audibility within the manufacturing industry with block chain.

And it looks like there’s some big players behind the movement.

https://www.blockchainresearchinstitute.org/manufacturing-1/

Correct me if I’m wrong, but doesn’t/hasn’t CALEA (communications assistance for law enforcement act) already provide a similar problem for US manufactured equipment? I am a CS neophyte still working on my CCNA RS/Security, so if that’s a thing of the past already I haven’t gotten there yet.

There is basically zero reason to use blockchain for that purpose and doesn’t actually add any security / reliability. NIST has a great graphic on when it’s a suitable replacement for a traditional DB

To be a little less terse, the issue is that supply chains can’t have random groups provide data into the trust chain. Blockchain is only valuable in the case anyone can enter without trust, without central groups or controlling authorities (the factories and supply chain users). You can do a trustful blockchain, but it doesn’t have any value over a database.

1 Like