• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

NSA Hides Spying Backdoors into Hard Drive Firmware

Joined
Feb 14, 2012
Messages
2,356 (0.50/day)
System Name msdos
Processor 8086
Motherboard mainboard
Cooling passive
Memory 640KB + 384KB extended
Video Card(s) EGA
Storage 5.25"
Display(s) 80x25
Case plastic
Audio Device(s) modchip
Power Supply 45 watts
Mouse serial
Keyboard yes
Software disk commander
Benchmark Scores still running
Bold font = +5
Enlarged font = +10
They = +15
 
Joined
Feb 2, 2015
Messages
2,707 (0.75/day)
Location
On The Highway To Hell \m/
 
Joined
Aug 20, 2007
Messages
21,546 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 5800X Optane 800GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Hmmm...at least some of my paranoid delusions are, as it turns out, based in reality. Imagine that. So I'll say it again, with confidence this time.

If you are connected to the internet...you are vulnerable! There are backdoors you've never(until just now probably) even heard of! If they want in, they'll get in! And there's nothing you can do about it! Don't pretend like they won't/can't!!!

"They" = Hackers of any/all types or persuasions.

This is why the first lesson in security class is to make the data harder to get at than it's value.

If they want it, yes they can get it. But who wants to spend 10 years looking for an obscure buffer overflow attack to get at your porn library? No one, that's who.

This is precisely why good security is still relevant, even if not impervious to hacking.
 

FordGT90Concept

"I go fast!1!11!1!"
Joined
Oct 13, 2008
Messages
26,259 (4.44/day)
Location
IA, USA
System Name BY-2021
Processor AMD Ryzen 7 5800X (65w eco profile)
Motherboard MSI B550 Gaming Plus
Cooling Scythe Mugen (rev 5)
Memory 2 x Kingston HyperX DDR4-3200 32 GiB
Video Card(s) AMD Radeon RX 7900 XT
Storage Samsung 980 Pro, Seagate Exos X20 TB 7200 RPM
Display(s) Nixeus NX-EDG274K (3840x2160@144 DP) + Samsung SyncMaster 906BW (1440x900@60 HDMI-DVI)
Case Coolermaster HAF 932 w/ USB 3.0 5.25" bay + USB 3.2 (A+C) 3.5" bay
Audio Device(s) Realtek ALC1150, Micca OriGen+
Power Supply Enermax Platimax 850w
Mouse Nixeus REVEL-X
Keyboard Tesoro Excalibur
Software Windows 10 Home 64-bit
Benchmark Scores Faster than the tortoise; slower than the hare.
I've read some reveals credited to him in various forums calling everything from AES to SSL into question without much cooreberating evidence. Those are the kind of things I take with a grain of salt, to say the least.
Because all of the material was leaked to the press, not public. They have to authenticate it and purge it of sensitive information (like people) so what does get published ends up very truncated. It is doubtful the documents he leaked will ever go public.

I know sources at The Guardian (US branch) and New York Times both received documents from Snowden. What you've heard about AES/SSL may be true:
http://www.zdnet.com/article/has-the-nsa-broken-ssl-tls-aes/
In short, Snowden didn't spell it out like he did on the data collection programs. He released information mostly from British sources that "vast amounts of encrypted internet data which have up till now been discarded are now exploitable" speaking of the NSA. "Vast" could only mean SSL/AES. It is not known if that includes TLS. Or maybe they were talking about TLS and not AES? We don't know.


Security? Relevant:
Point: 10 years from now, likely all data called "secure" today will be vastly considered insecure. Security is merely an illusion especially where digital is concerned.
 
Last edited:

GLD

Joined
May 13, 2006
Messages
1,631 (0.24/day)
Location
City 17, California, U.S.A.
Processor AMD Ryzen 7 5700X, AMD Wraith Prism.
Motherboard ASUS TUF X570-Plus (Wi-Fi).
Cooling Antec 120mm RGB case fans.
Memory 4x8gb, G.SKILL F4-3600C16D-16GVKC.
Video Card(s) Sapphire Pulse RX 6700.
Storage PNY XLR8 CS3040 2TB 4.0x4 NVMe ssd with Vantec ICEBERQ heat sink.
Display(s) ASUS VP278QG 27", 1080p, 75hz, FreeSync.
Case Antec GX202.
Audio Device(s) Onboard sound, Logitech Z625 THX 2.1's, Logitech G430 headphones.
Power Supply Seasonic Prime GX-750.
Mouse Logitech G203 Prodigy.
Keyboard Logitech G213.
Software Windows 11 Pro, @ Day 1.
I think I could make 5 Wiki pages from the spew in this thread. :laugh:
 
Joined
Aug 20, 2007
Messages
21,546 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 5800X Optane 800GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Point: 10 years from now, likely all data called "secure" today will be vastly considered insecure.
Indeed. That's pretty much the second lesson in a college security class.

Security is merely an illusion especially where digital is concerned.

True, but that doesn't make it irrelevant or useless. See the "first lesson of security" in my post above.
 
Joined
Apr 7, 2008
Messages
633 (0.10/day)
Location
Australia
System Name _Speedforce_ (Successor to Strike-X, 4LI3NBR33D-H, Core-iH7 & Nemesis-H)
Processor Intel Core i9 7980XE (Lapped) @ 5.2Ghz With XSPC Raystorm (Lapped)
Motherboard Asus Rampage VI Extreme (XSPC Watercooled) - Custom Heatsinks (Lapped)
Cooling XSPC Custom Water Cooling + Custom Air Cooling (From Delta 220's TFB1212GHE to Spal 30101504&5)
Memory 8x 8Gb G.Skill Trident Z RGB 4266MHz @ 4667Mhz (2x F4-4266C17Q-32GTZR)
Video Card(s) 3x Asus GTX1080 Ti (Lapped) With Customised EK Waterblock (Lapped) + Custom heatsinks (Lapped)
Storage 1x Samsung 970 EVO 2TB - 2280 (Hyper M.2 x16 Card), 7x Samsung 860 Pro 4Tb
Display(s) 6x Asus ROG Swift PG348Q
Case Aerocool Strike X (Modified)
Audio Device(s) Creative Sound BlasterX AE-5 & Aurvana XFi Headphones
Power Supply 2x Corsair AX1500i With Custom Sheilding, Custom Switching Unit. Braided Cables.
Mouse Razer Copperhead + R.A.T 9
Keyboard Ideazon Zboard + Optimus Maximus. Logitech G13.
Software w10 Pro x64.
Benchmark Scores pppft, gotta see it to believe it. . .
Sorry for the late post, I didn't notice this article. Ummm, didn't this happen already in 2000, and then again in 2002, 2005, 2007, 2008, 2010 and then 2012 ?
 
Joined
Oct 22, 2014
Messages
14,170 (3.81/day)
Location
Sunshine Coast
System Name H7 Flow 2024
Processor AMD 5800X3D
Motherboard Asus X570 Tough Gaming
Cooling Custom liquid
Memory 32 GB DDR4
Video Card(s) Intel ARC A750
Storage Crucial P5 Plus 2TB.
Display(s) AOC 24" Freesync 1m.s. 75Hz
Mouse Lenovo
Keyboard Eweadn Mechanical
Software W11 Pro 64 bit
Yes, and they have done it with Routers and Modems too.
 

qubit

Overclocked quantum bit
Joined
Dec 6, 2007
Messages
17,865 (2.87/day)
Location
Quantum Well UK
System Name Quantumville™
Processor Intel Core i7-2700K @ 4GHz
Motherboard Asus P8Z68-V PRO/GEN3
Cooling Noctua NH-D14
Memory 16GB (2 x 8GB Corsair Vengeance Black DDR3 PC3-12800 C9 1600MHz)
Video Card(s) MSI RTX 2080 SUPER Gaming X Trio
Storage Samsung 850 Pro 256GB | WD Black 4TB | WD Blue 6TB
Display(s) ASUS ROG Strix XG27UQR (4K, 144Hz, G-SYNC compatible) | Asus MG28UQ (4K, 60Hz, FreeSync compatible)
Case Cooler Master HAF 922
Audio Device(s) Creative Sound Blaster X-Fi Fatal1ty PCIe
Power Supply Corsair AX1600i
Mouse Microsoft Intellimouse Pro - Black Shadow
Keyboard Yes
Software Windows 10 Pro 64-bit
Yes, and they have done it with Routers and Modems too.
If they've backdoored network cards, CPUs and chipsets then even one of those hardened Linux DIY firewalls such as IPCop won't be secure from them.

I have no evidence either way, but I wouldn't be surprised if there's some revelation about this one day.
 
Joined
Nov 4, 2005
Messages
12,016 (1.72/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs, 24TB Enterprise drives
Display(s) 55" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
It's part of a larger thing. It also controls what is booting.


Nope, the motherboard BIOS controls the boot, Int13 http://en.wikipedia.org/wiki/INT_13H controlled/controls it, when the disk specified as the boot disk, or attached to the specified channel is queried and told to lad the code at the location provided, which is where the operating system, or boot loader reside, and as its loaded the CPU starts to execute the code which once the kernel is up and in system memory, and its threads have loaded their machine configuration and or looked them up from BIOS memory tables, it starts to load the rest of the actual GUI and drivers.


Even on most UEFI systems a small section of the disk for boot it partitioned off as an acceptable boot partition, such as MBR on Windows, that contains the data required to start the actual software boot.

If you are curious get a Hex editor and look at sectors http://en.wikipedia.org/wiki/Boot_sector and depending on how you look at it you can then determine what is being loaded.


But back to drive BIOS, how does it get transferred out of the PC to the NSA? By IP, and the OS and every major and customer hardware manufacturer is allowing this and not letting users see it? Or by some unknown pins even though people test and tweak systems and watch hardware input and output constantly? Or by voodoo magic?


Do I think it is happening? Yep

By the method described? Nope.

Specifically built hack firmware that is being released on machines built for use in some areas where they may not get access to others? Most likely.

Iran wants to buy servers, they have no manufacturing there, but Dell will sell them, and they report to the NSA or whoever about what they are selling, machines get loaded with a motherboard BIOS that allows low level access to the drives that the OS is unaware of, and either copies bits and pieces of the drive contents to a remote server, or causes corruption issues occasionally that they have to send techs in, or drives out and they are copied then.
 
Top