<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: More information on iLOBleed Rootkit in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157623#M9290</link>
    <description>&lt;P&gt;Is the issue actually resolved in updated firmware?&amp;nbsp; I cant find anything from HPE to say it is&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jan 2022 20:41:58 GMT</pubDate>
    <dc:creator>Tired_Admin</dc:creator>
    <dc:date>2022-01-04T20:41:58Z</dc:date>
    <item>
      <title>More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157480#M9283</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;As you all may know an iLO security risk has been published by various sources named &lt;STRONG&gt;iLOBleed Rootkit.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is there a KB, Advisory or any other document from HPE acknowledging the issue? What is the likelyhood of the systems to get infected? When should we receive an update for this threat and is there a CVS score for this?&lt;/P&gt;&lt;P&gt;Unfortunately I couldn't find any information about this threat, except for the non-HPE sources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jan 2022 05:36:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157480#M9283</guid>
      <dc:creator>steez</dc:creator>
      <dc:date>2022-01-06T05:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157512#M9284</link>
      <description>&lt;P&gt;&lt;A title="ILOBleed " href="https://securityaffairs.co/wordpress/126157/malware/ilobleed-wiper-hp-servers.html" target="_blank" rel="noopener"&gt;https://securityaffairs.co/wordpress/126157/malware/ilobleed-wiper-hp-servers.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have been checking for an update since i read about this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 21:51:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157512#M9284</guid>
      <dc:creator>Johnmcc215</dc:creator>
      <dc:date>2022-01-03T21:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157515#M9285</link>
      <description>&lt;P&gt;Actually, seems HPE disclosed this in 2018.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.techtarget.com/searchsecurity/news/252511500/Threat-actors-target-HPE-iLO-hardware-with-rootkit-attack" target="_blank" rel="noopener"&gt;https://www.techtarget.com/searchsecurity/news/252511500/Threat-actors-target-HPE-iLO-hardware-with-rootkit-attack&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 22:24:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157515#M9285</guid>
      <dc:creator>Johnmcc215</dc:creator>
      <dc:date>2022-01-03T22:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157594#M9287</link>
      <description>&lt;P&gt;Is anybody got any more information about this? At the moment all I can see just copies of different articles on different websites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;It's pretty hard for an MSP to monitor customers ILO. Anybody got any tips or tricks to do this?&lt;/P&gt;&lt;P&gt;If you want or upgrade firmware do you need a valid warranty from HPE?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 14:43:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157594#M9287</guid>
      <dc:creator>tashika92</dc:creator>
      <dc:date>2022-01-04T14:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157599#M9288</link>
      <description>&lt;P&gt;Avoid running old outdated firmware-&lt;/P&gt;&lt;P&gt;Keep the firmware current&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.hpe.com/hpesc/public/swd/detail?swItemId=MTX_97f5079671c84a11ac776a92cb" target="_blank"&gt;https://support.hpe.com/hpesc/public/swd/detail?swItemId=MTX_97f5079671c84a11ac776a92cb&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 15:18:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157599#M9288</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2022-01-04T15:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157623#M9290</link>
      <description>&lt;P&gt;Is the issue actually resolved in updated firmware?&amp;nbsp; I cant find anything from HPE to say it is&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 20:41:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157623#M9290</guid>
      <dc:creator>Tired_Admin</dc:creator>
      <dc:date>2022-01-04T20:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157627#M9291</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbhf03769en_us" target="_blank"&gt;HPESBHF03769 rev.2 - HPE Integrated Lights-out 4 (iLO 4), and Moonshot Multiple Remote Vulnerabilities&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 21:45:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157627#M9291</guid>
      <dc:creator>Superscouser</dc:creator>
      <dc:date>2022-01-04T21:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157635#M9292</link>
      <description>&lt;P&gt;Read this sometime back:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.hpe.com/us/en/insights/articles/rise-in-attacks-exposes-neglected-firmware-security-2111.html" target="_blank"&gt;https://www.hpe.com/us/en/insights/articles/rise-in-attacks-exposes-neglected-firmware-security-2111.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 05:53:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157635#M9292</guid>
      <dc:creator>techin</dc:creator>
      <dc:date>2022-01-05T05:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157700#M9294</link>
      <description>&lt;P&gt;I had opened a ticket with HPE support for this and they confirmed it was patched in 2017 as a previous poster reported&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Greetings from HPE!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is regarding the above mentioned HPE case.&lt;/P&gt;&lt;P&gt;The rootkit named iLOBleed is based on the malware module Implant.ARM.iLOBleed discovered in the iLO firmware.&lt;/P&gt;&lt;P&gt;The security vulnerability affects HPE Integrated Lights-out 4 (iLO 4) and was previously disclosed and patched in 2017. HPE Integrated Lights-out 5 (iLO 5) is not affected.&lt;/P&gt;&lt;P&gt;Actions: HPE provided firmware updates in 2017 to resolve the HPE Integrated Lights-out vulnerability. Customers need to follow the remedial steps previously provided in 2017 to upgrade HPE Integrated Lights-out 4 (iLO4). See the security bulletin mentioned below:&lt;/P&gt;&lt;P&gt;This is an exploit of a vulnerability that was disclosed and patched in 2017.&lt;/P&gt;&lt;P&gt;For More Information: The following security bulletin published under CVE (CVE-2017-12542) provide more information and remedial steps to upgrade HPE Integrated Lights-out 4 (iLO 4).&lt;/P&gt;&lt;P&gt;HPE Integrated Lights-out 4 (iLO 4), and Moonshot Multiple Remote Vulnerabilities - &lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=hpesbhf03769en_us" target="_blank"&gt;https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=hpesbhf03769en_us&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 18:29:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7157700#M9294</guid>
      <dc:creator>Tired_Admin</dc:creator>
      <dc:date>2022-01-05T18:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7158272#M9298</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;I'm from Amnpardaz, which found the rootkit.&lt;/P&gt;&lt;P&gt;I want to clarify some important points that i think if missed, you'll beleive you're safe while you are not.&lt;/P&gt;&lt;P&gt;1 - We've seen &lt;STRONG&gt;fully patched&lt;/STRONG&gt; G7 to G9 and even G10 servers' firmware affected by these attacks, while the persistent malware (aka iLOBleed) was currently found only in iLO-4 (G8, G9).&lt;/P&gt;&lt;P&gt;2 - You're not safe even if you've applied the latest patches, because:&lt;/P&gt;&lt;P&gt;a) If your firmware is infected before you upgrade it, the malware will simulate the firmware upgrade process. You'll notice nothing wrong and think you're safe and using the latest patches, while you're not.&lt;/P&gt;&lt;P&gt;b) If you're lucky and have upgraded the firmware before any infections occurred, you're still at risk: HP servers allow downgrading firmware to lower vulnerable versions. So all it takes for the attacker is to downgrade, infect and upgrade it for you.&lt;/P&gt;&lt;P&gt;3 - There is a mechanism in G10 servers (iLO 5) to prevent downgrade. But this is not enabled by default and you have to enable it manually, &lt;EM&gt;which maybe you should do right now&lt;/EM&gt;. (Older servers don't have this option, and until I missed something, &lt;STRONG&gt;there is no way to protect them that I know of&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;4 - Currently there is no trusted way to "directly" verify a server's firmware. In fact, there is no way to verify it at all. For this we're publishing a tool soon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 12:22:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7158272#M9298</guid>
      <dc:creator>Nafisi</dc:creator>
      <dc:date>2022-01-14T12:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: More information on iLOBleed Rootkit</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7159341#M9303</link>
      <description>&lt;P&gt;Just wanted to say that the iLO Scanner has been published as opensource:&lt;/P&gt;&lt;P&gt;&lt;A href="https://kb.amnpardaz.com/en/2022/562/what-is-ilobleed/" target="_blank"&gt;https://kb.amnpardaz.com/en/2022/562/what-is-ilobleed/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;There, you can find a hopefully useful FAQ about iLOBleed and how to protect against it, too.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 06:46:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/more-information-on-ilobleed-rootkit/m-p/7159341#M9303</guid>
      <dc:creator>Nafisi</dc:creator>
      <dc:date>2022-01-29T06:46:18Z</dc:date>
    </item>
  </channel>
</rss>

