March 25, 2015 By Shane Schick 2 min read

As security threats go, the LightEater malware contains some of the worst possible elements. It’s easy enough to be used by everyday people, exploits a vulnerability common in the majority of computer systems and can have an effect in about two minutes.

At the CanSecWest security conference taking place in Vancouver, Canada, this week, researchers Xeno Kovah and Corey Kallenberg presented research showing how they discovered basic holes in BIOS chips. This allowed them to infect machines with the LightEater malware, a bootkit that could hit many systems at the same time and gain high levels of access to steal passwords or other data. Wired noted the malicious code could persist even on PCs that were wiped and given a new operating system.

It is important to note here that the LightEater malware is a proof of concept that hasn’t actually been used for criminal purposes. However, in an interview with Threatpost, the researchers said the vulnerability stems from the open-source code within the BIOS of most computers and could allow third parties to hack into the System Management Mode and take over various hardware controls.

In this case, compromising systems via the BIOS would require the attackers to already have remote access to a machine. However, BetaNews observed that similar vulnerabilities have already been exploited by the U.S. National Security Agency. The difference here is that the LightEater malware takes advantage of flaws that are widespread and relatively simple to find.

In theory, the threat disclosed in the CanSecWest presentation could affect anyone, from home users to businesses and governments. However, FierceCIO suggested a great deal of the risk could be mitigated if IT departments simply become more proactive about applying patches and updates to the BIOS. That seems to be the overall message the researchers are trying to convey, too.

A final but critical point was made by SC Magazine, which posited that something like the LightEater malware might be better described as an advanced persistent threat, potentially making it an even higher priority for those aiming to better protect their data from cybercriminal activity. After all, a BIOS is not only central to nearly all hardware, but even a hypothetical illustration of an attack should be taken as seriously as the real thing.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today