Anonymous ID: 364a1f March 8, 2019, 5:15 p.m. No.5582182   🗄️.is 🔗kun   >>2401 >>2443 >>2591

Nation states conduct cyber espionage via processors (aka cores) since at least 2007. Most likely a bit sooner.

 

Last night Q posted"

>>5565314 (/pb)

Something you should explore further.

Impressive, most impressive.

Q

 

The portion I looked into today in that post he refers to:

I went into Vault 7 Projects, search for “fire”….

“Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system”

 

Specifically, I dug on BadMFS and came up with this:

 

Derstarke 2.0 uses the DarkDream exploit

The HackingTeam, Snowden, Shadow Brokers, and Vault7 leaks have revealed that UEFI/BIOS implants aren't just a theoretical concept but have actually been weaponized by nation states to conduct cyber espionage. Physical access requirements are a thing of the past, these low level implants can be installed remotely by exploiting vulnerabilities in the underlying UEFI system.

Today at BlackHat Asia 2017, we are disclosing two vulnerabilities in two different models of the GIGABYTE BRIX platform:

GB-BSi7H-6500 – firmware version: vF6 (2016/05/18)

GB-BXi7-5775 – firmware version: vF2 (2016/07/19)

 

Version 2.1 of the UEFI specification was released on 7 January 2007. It added cryptography, network authentication and the user interface architecture ('Human Interface Infrastructure' in UEFI). The latest UEFI specification, version 2.7, was approved in May 2017.

 

Blend of sauces: (all recommended reading.

https://wikileaks.org/ciav7p1/cms/page_13763800.html

https://www.slideshare.net/SallyFeller/uefi-firmware-rootkits-myths-and-reality

https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface