NSA in your Hard Drive

piasabird

Lifer
Feb 6, 2002
17,168
60
91
http://news.yahoo.com/russian-resea...rough-u-spying-program-194217480--sector.html

SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

This may be old. However, is your hard drive spying on you?

No one is safe from our evil government.

Or is this just all a hoax spread by Russians.
 

nickqt

Diamond Member
Jan 15, 2015
7,596
7,854
136
http://news.yahoo.com/russian-resea...rough-u-spying-program-194217480--sector.html

SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

This may be old. However, is your hard drive spying on you?

No one is safe from our evil government.

Or is this just all a hoax spread by Russians.
Perhaps it's a hoax by the US government and they really can't.
 

Smoblikat

Diamond Member
Nov 19, 2011
5,184
107
106
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.

So USA isnt even listed there, and it looks like they are just targeting big buisnesses/government. I dont think this is particularly widespread throughout the general populations computers.
 

silicon

Senior member
Nov 27, 2004
886
1
81
http://news.yahoo.com/russian-resea...rough-u-spying-program-194217480--sector.html

SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

This may be old. However, is your hard drive spying on you?

No one is safe from our evil government.

Or is this just all a hoax spread by Russians.
the code would need to be in the firmware for the HD somehow.
 

inachu

Platinum Member
Aug 22, 2014
2,387
2
41
In the registry or firmware to be totally hidden.
I do like the fact that the domains are not kept up so that antivirus firms buy them out and track the communication then can protect against the files and communication.
 

Data-Medics

Member
Nov 25, 2014
131
0
0
www.data-medics.com
This document from Kaspersky: http://25zbkz3k00wn2tp5092n6di7b5k....5/02/Equation_group_questions_and_answers.pdf

Explains more about it. Apparently it's a virus that can elevate it's permissions, send vendor specific ATA commands and write itself into the hard drive's service area (where the firmware is stored). Pretty cool stuff, but a major security risk for high tech companies. Especially since it's only speculated to be the NSA, but could just as easily be another country or even just a really good hacker group.

I've posted a challenge the data recovery forum to see who can figure out a detection method: http://www.data-medics.com/forum/viewtopic.php?f=5&t=163

I'm trying to see if Kaspersky will share the firmware code they found with me.
 

master_shake_

Diamond Member
May 22, 2012
6,430
291
121
some european countires have invested in typewriters after snowden leaked all that info.

he's an american hero, just like george washington.
 

irishScott

Lifer
Oct 10, 2006
21,568
3
0
Arstechnica has a great rundown on it (as well as other capabilities)
http://arstechnica.com/security/201...-nsa-hid-for-14-years-and-were-found-at-last/

Basically they reverse-engineered hard drive firmware to the point where they can re-flash some brands of hard drives with the appropriate malware. At that point they set aside a small portion of said drive to store whatever they want, so their malware can survive wipes and reformating and is all but completely undetectable.

Only way to detect it would be to intercept the malicious transmissions, manual analysis of the hard drive platters, or noticing a small difference in the hard drive's available capacity. Relatively easy to fix by simply re-flashing the firmware with factory images though.
 
Last edited:

irishScott

Lifer
Oct 10, 2006
21,568
3
0
some european countires have invested in typewriters after snowden leaked all that info.

he's an american hero, just like george washington.

Wasn't that Russia?

I agree with Snowden being a hero, but going back to the 1960s is not the solution.
 

VirtualLarry

No Lifer
Aug 25, 2001
56,450
10,119
126
or noticing a small difference in the hard drive's available capacity. Relatively easy to fix by simply re-flashing the firmware with factory images though.

inachu and someone else pointed out in a tech-support thread (that I was unable to re-find), that some HDDs (all?) have factory service areas, some even have entire platter surfaces, that are usable, but not ordinarily user-accessable LBAs.

And re-flashing the firmware, in an embedded system, in which the rogue firmware has already taken hold, and is the "gatekeeper" of the host I/O protocol, may be impossible, unless there is a physical jumper setting on the drive to enable a factory recovery mode, that basically gives you a hardline to the firmware areas to re-write them.
 

irishScott

Lifer
Oct 10, 2006
21,568
3
0
inachu and someone else pointed out in a tech-support thread (that I was unable to re-find), that some HDDs (all?) have factory service areas, some even have entire platter surfaces, that are usable, but not ordinarily user-accessable LBAs.

And re-flashing the firmware, in an embedded system, in which the rogue firmware has already taken hold, and is the "gatekeeper" of the host I/O protocol, may be impossible, unless there is a physical jumper setting on the drive to enable a factory recovery mode, that basically gives you a hardline to the firmware areas to re-write them.

Wouldn't such hardware be safe from this attack in the first place? If there's no way to re-flash the firmware after it leaves the factory, how is the NSA supposed to do it?
 

Kadarin

Lifer
Nov 23, 2001
44,303
15
81
Wouldn't such hardware be safe from this attack in the first place? If there's no way to re-flash the firmware after it leaves the factory, how is the NSA supposed to do it?

NSA probably flashes it at the factory.
 

VirtualLarry

No Lifer
Aug 25, 2001
56,450
10,119
126
Wouldn't such hardware be safe from this attack in the first place? If there's no way to re-flash the firmware after it leaves the factory, how is the NSA supposed to do it?

That's not quite what I was saying. What I was trying to point out was that, flashing the firmware of a device controlled by host I/O, is up to that embedded system. If it gets flashed with rogue firmware, it's game-over, unless there a factory diag hardwire somewhere.

But what you were saying is true too - I wish more devices had PHYSICAL write-protect switches, both for the data contents, as well as the firmware. Even better if they had a micro-sized rotary key, such that you could keep it on your person, and no-one would be able to flash the firmware in your absence.
 

master_shake_

Diamond Member
May 22, 2012
6,430
291
121

CZroe

Lifer
Jun 24, 2001
24,195
856
126
Hitachi hard drive user here.
They listed IBM. This uses Stuxnet zero-day exploits, which are from a time where what you are using today is not relevant. Were you using Hitachi with Windows XP? Back then they were still very much like IBM because their HDD division had only recently been purchased from IBM. Unless only IBM server drive firmwares were vulnerable, Hitachi was almost certainly vulnerable too.
 
Last edited:

GreenGreen

Junior Member
Feb 8, 2015
19
0
0
http://news.yahoo.com/russian-resea...rough-u-spying-program-194217480--sector.html

SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

This may be old. However, is your hard drive spying on you?

No one is safe from our evil government.

Or is this just all a hoax spread by Russians.

What is clear- the exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China. That's not good, actually.
 

CZroe

Lifer
Jun 24, 2001
24,195
856
126
Hitachi and WD are the same company.

Yeah, now they are. Back then that was more true about IBM's consumer HDD division and Hitachi. The zero-day exploits this used were the same as Stuxnet, which makes this Windows XP era.
 

gevorg

Diamond Member
Nov 3, 2004
5,075
1
0
I bet CEOs/management of these hard drive companies go WTF with news like this. All it takes is just one or a few moles/agents on the firmware development crew to do their job for NSA, and if they refuse, there is always blackmail.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |