wonderfully unique software solutions

Firmware hackers target embedded systems and IoT apps

Microsoft’s report of a a rise in firmware attacks partly reflects the rise of embedded systems and the Internet of Things (IoT), according to Richard Gall, blogging for cybersecurity vendor Macrium.

Gall said that Microsoft found that around eight in ten enterprises have suffered at least one firmware attack over the past two years. Firmware contains sensitive core information, such as encryption, that can make it a valuable target.

“[But] one trend not mentioned in [Microsoft’s] blog post is the growth of embedded systems and IoT. We can see this in the rise of a certain type of consumer product (think FitBits and Apple Watches) but the real boom is happening in industrial settings.

“As machinery becomes increasingly more connected and network enabled, accessing firmware could grow even further in value, as it could potentially give cybercriminals or cyberterrorists access to vital infrastructure.”

Microsoft said that businesses aren’t paying enough attention to firmware threats, with only 29% of security budgets allocated to defending firmware.

Gall agreed the industry could focus more on firmware issues, which can often be overlooked. Hopefully, this could encourage vendors to work out how to deliver “more sustained” defences.

“It’s nevertheless important to recognise we’re living in a world where the challenges are so complex and global that they will need to be driven by organisations like Microsoft working with hardware manufacturers,” Gall said.

Firmware programs sit between the operating system and the hardware, bridging those two critical building blocks of IT.

“In very simple devices, the firmware actually is the operating system. If all that a user needs is a way to interact with the specifics of the hardware, then firmware is sufficient,” said Gall.

Part of what’s needed is visibility into the firmware layer to ensure devices haven’t been compromised before boot-up or at runtime below the operating-system kernel. Most firmware attacks target the kernel or the physical hardware.

“The fact that so many cybersecurity teams are doing things manually that could be automated (82%) does require serious thinking,” said Gall.

Read the full explainer.

( Photo by Andres Urena on Unsplash )

Recent Articles

Responsibility shifts towards vendors with US National Cybersecurity Strategy

The US government has called for aggressive regulation as part of its National Cybersecurity Strategy for 2023, ITops company Automox has warned.

Four critical challenges for cybersecurity provision in 2023

Skill sets, AI, co-operation, and climate have become the critical challenges for cybersecurity provision this year, according to Europe-based IT/OT security software...

Snow adds certifications to partner programme to drive Atlas sales

Technology intelligence software platform Snow Atlas has achieved ISO 27001 certification and completed the Service Organisation Control (SOC) 2 Type 1 examination...

Arista says edge threat defences could have safeguarded Tallahassee health

Tallahassee Memorial Health might not have been disrupted in February, requiring systems downtime and patient inconvenience, had it deployed strong edge threat...

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox