- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Rotten to the core? Defend against invasive firmwa...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Rotten to the core? Defend against invasive firmware attacks with HPE Gen10 Plus
Ransomware, worms, and trojan horses get all the attentionโbut firmware attacks pose just as significant a threat. Find out how to defend against them with HPE Gen10 Plus servers.
When I was growing up, I would spend my summers doing odd jobs around my neighborhood, giving quotes to my neighbors for whatever they needed done. Mowing lawns was always popular, but I did it allโsmall landscaping gigs, little demolition projects (my favorite), and everything in between. I must have done a thousand jobs in my neighborhood over the years, but one memory has always stuck with me: the damage done to Mrs. Fullerโs apple tree by termites.
It was one of the saddest jobs I ever did because it means chopping down the tree that supplied apples all summer long to the neighborhood children. It had been ruined by the destructive pests.
I didnโt know it at the time, but one day I would be working to defeat a โtermiteโ of a different kind. Preventing malware from infiltrating the firmware of a server is not so different from preventing termites from eating the trunk of Mrs. Fullerโs apple tree. Firmware is a permanent type of software embedded in a piece of hardware and controls basic low-level functions of a server. Because malware attacks aimed at firmware go right to the foundation, they bypass the software thatโs meant to detect potential threats.
The threat nobody is talking about
Firmware hacks donโt get the attention they deserve alongside ransomware, worms, and trojan horses. But the threat they pose is just as significantโone could argue, even more significant. By infecting the lower stack of a device, the malware completely bypasses the antivirus software. The power criminals have once the server infrastructure is infected is nearly limitless, granting the โkeys to the kingdomโ to whoever controls the malware. If a firmware attack is successful, ransomware and other malware can be employed at will. If termites (malware) attack a branch of Mrs. Fullerโs apple tree, we can chop off the branch. But if they attack the trunk, they have access to everything, compromising the entire tree.
Studies from both Gartner and Microsoft have illuminated just how common firmware attacks have become. Gartner found that 70% of organizations lacking a firmware upgrade plan will be breached by 2022 (YOU HAVE THREE MONTHS!). Microsoftโs report, that surveyed 1,000 cyber-security decision-makers at enterprises around the world found that 80% of companies have experienced a firmware attack in the last two years. These are staggering numbers that ought to be making bigger headlines, but it seems that security executives may finally be taking note after a few high-profile firmware attacks.
Robbing from the rich and giving to the poor-er, keeping for themselves I mean, is what the hackers at RobbinHood had in mind in 2019. Attacking the databases of a number of US city governments, RobbinHood held the data hostage until a ransom was paid in Bitcoin.
Thunderspy attacks are another troubling type of vulnerability that exhibit how undetectable firmware attacks can be. For Thunderspy to be successful, a server needs to be physically tampered with, but it only takes about 5 minutes for a criminal to access the server infrastructure, reprogram the firmware, and carry out one of these attacks. Going straight for the direct memory access (DMA) that hardware components use to talk to one another, this attack is virtually traceless as data can be read and copied even while a hard drive is asleep, encrypted, or locked.
One of the most prominent cyberattack groups comes from Russia. Most commonly known as Fancy Bear, but also as APT28, Sofacy, Sednit and a few other aliases, they are credited with the first UEFI rootkit which, until it was discovered in 2018, had only been discussed as proofs of concept, never realityโa sci-fi script turned reality. The US Department of Justice determined that it was Fancy Bear who was responsible for the hack on the Democratic National Committee just before the 2016 presidential election.
Firmware attack prevention
The Microsoft study that I mentioned earlier highlights companyโs shortcomings in their response to the rise in firmware attacks. Because firmware attacks are beneath the operating system where credentials and encryption tools live, the โprotect and detectโ method is already too late. The trunk of our tree has been compromised and the attack can now spread through the branches. There needs to be more investment in proactive measures.
Enter HPE
Our first line of defense, the Silicon Root of Trust (SRoT) goes deepโliterally down to the silicon, and offers a security foundation that allows only the recognized firmware to be installed onto the server. Because itโs built on a hardware-validated boot process that is rooted in hardware that cannot be changed or modified, only code from an established, unchanging source can start the server. If a threat is detected, it can recover rapidly to the last known secure state without any manual assistance. Being able to guarantee that even the silicon in the hardware is secure is something that only HPE offers. Insurers from Marsh McLellanโs Cyber Technology Evaluation Program dubbed the HPE Silicon Root of Trust a โclose to perfect solution.โ Think of the Silicon Root of Trust as the defense against termites for the roots of the apple tree.
In order to protect the trunk of the tree, HPE Integrated Lights-Out firmware, or iLO, raises the security bar eve higher because of its unbreakable relationship with the Silicon Root of Trust. Because the iLO chip is baked into the silicon itself with a unique โfingerprintโ, it will identify the iLO firmware as a match to the fingerprint. Any tampering with the firmware will make it incompatible with the chip and will not be allowed to run. When the iLO firmware is verified by the chip, it then goes on to verify the UEFI BIOS, the System Programmable Logic Device, the Innovation Engine, and the Sever Platform Services. Referred to as the Secure Start Base, the initial familiarity between the chip in the silicon and the iLO firmware is what makes this process so secure. With iLO, servers can be configured, updated, and maintained with confidence from anywhere using strong authentication, configurable user privileges, authorization processes, and encryption on keystrokes, data, and security keys.
Moving up the line of security and protection offered by the SRoT is the UEFI Secure Boot. For bad actors, capitalizing on a pre-boot attack opportunity can grant systematic control of a server. UEFI malware will detect whether or not it is unlocked or write-protected. Surprisingly, not all UEFI systems are write-protected and if it is unlocked, malware can activate its own UEFI patches. To combat this threat during the boot process, HPE Secure Boot verifies the identity of several key components, including OS UEFI boot loaders, UEFI drivers loaded from PCIe cards, mass storage devices and other shell applications. UEFI Secure Boot is built in to Gen 10 Plus servers and ensures that each application launched while booting is checked against a digital signature and validated through a series of trusted certificates.
Further up the trunk of the tree and building once again on the foundation built by the Silicon Root of Trust and iLO, another new HPE Gen10 Plus feature provides yet another layer of protection. When HPE device manufacturers have the servers on the production floor, they have an opportunity to bind them to unique device identifiers. This could be considered the โbirthโ of the device and the identifier is known as an iLO IDevID. When the identifier is issued, a Certificate Signing Request is sent (through a private network) to HPEโs Certificate Authority where it is signed and protected by FIPS 140-2 Level 3 Validated Hardware Security Modules in HPEโs data center. These credentials will stay with a server for the duration of its lifetime regardless of what goes on with the Operating System. Without the highest level of security during the production of servers, all the features previously mentioned could be undone by human error or bad actors with access to servers or server components at any stage of the supply chain. Thatโs why HPE takes a global approach to securing components from manufacturing to transit to the warehouse.
For enterprise companies in financial, healthcare, and government sectors that need the highest level of assurance of a safe and secure supply chain, we go a step further and offer the HPE Trusted Supply Chain. This ensures peace-of-mind that all server components are assembled domestically, without passing through the hands of anybody but highly-vetted HPE employees. Companies can even request delivery a dedicated truck driver with security and HPE personnel to set up the servers and make them operational. HPE is the only major server company to offer this, and soon the same option will be available in Europe and Asia.
While working to saw at the trunk of Mrs. Fullerโs tree all those years ago I could never have imagined that years later I would be comparing the experience to preventing firmware attacks. The advances in both cyber-security and malware have been astonishing, but what I know for certain is that HPE will remain on the cutting edge, securing valuable data and letting the world work more safely and efficiently.
Be on the lookout for our next blog post where we dive deeper into current events of security threats and defenses. For more information, please visit us at hpe.com.
Cole Humphreys
Hewlett Packard Enterprise
twitter.com/HPE_Servers
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If youโre not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYCโข 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
154 -
HPC & SUPERCOMPUTING
137 -
Mission Critical
87 -
SMB
169