Hunting for backdoors in counterfeit Cisco devices

Hunting for backdoors in counterfeit Cisco devices

ID: 616643

F-Secure's investigation highlights challenges facing organizations that discover counterfeit components in their IT infrastructure

(PresseBox) - Hardware security specialists with cyber security provider F-Secure have published a report detailing their investigation into a pair of counterfeit network switches. The investigation, which concluded that the counterfeits were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware. F-Secure Consulting?s Hardware Security team investigated two different counterfeit versions of Cisco Catalyst 2960-X series switches. The counterfeits were discovered by an IT company after a software update stopped them from working, which is a common reaction of forged/modified hardware to new software. At the company?s request, F-Secure Consulting performed a thorough analysis of the counterfeits to determine the security implications. The investigators found that while the counterfeits did not have any backdoor-like functionality, they did employ various measures to fool security controls. For example, one of the units exploited what the research team believes to be a previously undiscovered software vulnerability to undermine secure boot processes that provide protection against firmware tampering. ?We found that the counterfeits were built to bypass authentication measures, but we didn?t find evidence suggesting the units posed any other risks,? said Dmitry Janushkevich, a senior consultant with F-Secure Consulting?s Hardware Security team, and lead author of the report. ?The counterfeiters? motives were likely limited to making money by selling the components. But we see motivated attackers use the same kind of approach to stealthily backdoor companies, which is why it?s important to thoroughly check any modified hardware.?  The counterfeits were physically and operationally similar to an authentic Cisco switch. One of the unit?s engineering suggests that the counterfeiters either invested heavily in replicating Cisco?s original design or had access to proprietary engineering documentation to help them create a convincing copy. According to F-Secure Consulting?s Head of Hardware Security Andrea Barisani, organizations face considerable security challenges in trying to mitigate the security implications of sophisticated counterfeits such as the those analyzed in the report.   ?Security departments can?t afford to ignore hardware that?s been tampered with or modified, which is why they need to investigate any counterfeits that they?ve been tricked into using,? explained Barisani. ?Without tearing down the hardware and examining it from the ground up, organizations can?t know if a modified device had a larger security impact. And depending on the case, the impact can be major enough to completely undermine security measures intended to protect an organization?s security, processes, infrastructure, etc.? F-Secure has the following advice to help organizations prevent themselves from using counterfeit components:





Source all your components from authorized resellers

Have clear internal processes and policies that govern procurement processes

Ensure all components run the latest available software provided by vendors

Make note of even physical differences between different units of the same product, no matter how subtle they may be

 ?We?re world leaders when it comes to breaking and implementing secure boot schemes, which are integral in protecting intellectual property and ensuring authenticity of firmware and hardware products. Our detailed analysis of this case highlights not only the challenges in determining the security implications of counterfeits, but also how we can support and reassure organizations that discover suspicious devices in their infrastructure," added Barisani.  The full report is available on F-Secure Labs. F-Secure Consulting operates on four continents from 11 different countries. It provides cyber security services tailored to fit the needs of banking, financial services, automotive, aviation, shipping, retail, insurance, and other organizations working in highly targeted sectors. More information on F-Secure Consulting is available here.

Nobody has better visibility into real-life cyber attacks than F-Secure. We?re closing the gap between detection and response, utilizing the unmatched threat intelligence of hundreds of our industry?s best technical consultants, millions of devices running our award-winning software, and ceaseless innovations in artificial intelligence. Top banks, airlines, and enterprises trust our commitment to beating the world?s most potent threats. Together with our network of the top channel partners and over 200 service providers, we?re on a mission to make sure everyone has the enterprise-grade cyber security we all need.

Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.

f-secure.com | twitter.com/fsecure | linkedin.com/f-secure?

Weitere Infos zu dieser Pressemeldung:
Unternehmensinformation / Kurzprofil:

Nobody has better visibility into real-life cyber attacks than F-Secure. We?re closing the gap between detection and response, utilizing the unmatched threat intelligence of hundreds of our industry?s best technical consultants, millions of devices running our award-winning software, and ceaseless innovations in artificial intelligence. Top banks, airlines, and enterprises trust our commitment to beating the world?s most potent threats. Together with our network of the top channel partners and over 200 service providers, we?re on a mission to make sure everyone has the enterprise-grade cyber security we all need.Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.f-secure.com | twitter.com/fsecure | linkedin.com/f-secure?



drucken  als PDF  an Freund senden  Rohde&Schwarz and TSN Systems provide nanosecond-precision latency measurements for automotive Ethernet StaySafe Solutions from KECK - enable the \
Bereitgestellt von Benutzer: PresseBox
Datum: 15.07.2020 - 17:04 Uhr
Sprache: Deutsch
News-ID 616643
Anzahl Zeichen: 5244

contact information:
Town:

Helsinki, Finland



Kategorie:

Hazadous Materials Management



Diese Pressemitteilung wurde bisher 227 mal aufgerufen.


Die Pressemitteilung mit dem Titel:
"Hunting for backdoors in counterfeit Cisco devices"
steht unter der journalistisch-redaktionellen Verantwortung von

F-Secure GmbH (Nachricht senden)

Beachten Sie bitte die weiteren Informationen zum Haftungsauschluß (gemäß TMG - TeleMedianGesetz) und dem Datenschutz (gemäß der DSGVO).

The connected home revolution will only get more personal ...

The connected home is expanding deeper into consumers? lives thanks to a new breed of early adopters, according to a new report from cyber security provider F-Secure.* While smart TVs and other entertainment devices led the first wave of the smart ho ...

Alle Meldungen von F-Secure GmbH



 

Werbung



Facebook

Sponsoren

foodir.org The food directory für Deutschland
Informationen für Feinsnacker finden Sie hier.

Firmenverzeichniss

Firmen die firmenpresse für ihre Pressearbeit erfolgreich nutzen
1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z