Obviously we have a serious problem with hardware and it goes both ways. The solution needs to be an internally secure supply line delivering at the best global price to prevent extortion. I think it can be done.
That enforces a local supply chain in order to access the secure market. It may well be partially subsidized by low pricing offshore but that is too bad. It can be done.
This will take time to sort out, but it adds to the list of charge backs we can apply to China.
..
New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom
The discovery shows that China continues to sabotage critical technology components bound for America.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc.
in its network and removed it in August, fresh evidence of tampering
in China of critical technology components bound for the U.S., according
to a security expert working for the telecom company.
The security expert, Yossi Appleboum, provided documents, analysis and other evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that
detailed how China’s intelligence services had ordered subcontractors
to plant malicious chips in Supermicro server motherboards over a
two-year period ending in 2015.
Appleboum previously
worked in the technology unit of the Israeli Army Intelligence Corps
and is now co-chief executive officer of Sepio Systems in
Gaithersburg, Maryland. His firm specializes in hardware security and
was hired to scan several large data centers belonging to the
telecommunications company. Bloomberg is not identifying the company due
to Appleboum’s nondisclosure agreement with the client. Unusual
communications from a Supermicro server and a subsequent physical
inspection revealed an implant built into the server’s Ethernet
connector, a component that's used to attach network cables to the
computer, Appleboum said.
The executive said he has seen similar manipulations of
different vendors' computer hardware made by contractors in China, not
just products from Supermicro. “Supermicro is a victim -- so is everyone
else,” he said. Appleboum said his concern is that there are countless
points in the supply chain in China where manipulations can be
introduced, and deducing them can in many cases be impossible. “That's
the problem with the Chinese supply chain,” he said.
Supermicro, based in San Jose, California, gave this
statement: “The security of our customers and the integrity of our
products are core to our business and our company values. We take care
to secure the integrity of our products throughout the manufacturing
process, and supply chain security is an important topic of discussion
for our industry. We still have no knowledge of any unauthorized
components and have not been informed by any customer that such
components have been found. We are dismayed that Bloomberg would give us
only limited information, no documentation, and half a day to respond
to these new allegations.”
Bloomberg News first contacted
Supermicro for comment on this story on Monday at 9:23 a.m. Eastern time
and gave the company 24 hours to respond.
Supermicro said after the earlier story that it “strongly
refutes” reports that servers it sold to customers contained malicious
microchips. China's embassy in Washington did not return a request for
comment Monday. In response to the earlier Bloomberg Businessweek investigation, China’s Ministry of Foreign Affairs didn’t directly address questions
about the manipulation of Supermicro servers but said supply chain
security is “an issue of common concern, and China is also a victim.”
Supermicro shares plunged 41 percent last Thursday, the most since it became a public company in 2007, following the Bloomberg Businessweek revelations about the hacked servers. They fell as much as 27 percent on Tuesday after the latest story.
The more recent manipulation is different from the one described in the Bloomberg Businessweek report
last week, but it shares key characteristics: They’re both designed to
give attackers invisible access to data on a computer network in which
the server is installed; and the alterations were found to have been
made at the factory as the motherboard was being produced by a
Supermicro subcontractor in China.
Based on his inspection of the
device, Appleboum determined that the telecom company's server was
modified at the factory where it was manufactured. He said that he was
told by Western intelligence contacts that the device was made at a
Supermicro subcontractor factory in Guangzhou, a port city in
southeastern China. Guangzhou is 90 miles upstream from Shenzhen, dubbed
the `Silicon Valley of Hardware,’ and home to giants such as Tencent
Holdings Ltd. and Huawei Technologies Co. Ltd.
The tampered
hardware was found in a facility that had large numbers of Supermicro
servers, and the telecommunication company's technicians couldn’t answer
what kind of data was pulsing through the infected one, said Appleboum,
who accompanied them for a visual inspection of the machine. It's not
clear if the telecommunications company contacted the FBI about the
discovery. An FBI spokeswoman declined to comment on whether it was
aware of the finding.
AT&T Inc. spokesman Fletcher Cook said, “These devices are not part of our network, and we are not affected.” A Verizon Communications Inc. spokesman said “we’re not affected.” T-Mobile U.S. Inc. and Sprint Corp. didn’t respond to requests for comment.
Sepio Systems’ board
includes Chairman Tamir Pardo, former director of the Israeli Mossad,
the national defense agency of Israel, and its advisory board includes
Robert Bigman, former chief information security officer of the U.S.
Central Intelligence Agency.
U.S. communications networks are an
important target of foreign intelligence agencies, because data from
millions of mobile phones, computers, and other devices pass through
their systems. Hardware implants are key tools used to create covert
openings into those networks, perform reconnaissance and hunt for
corporate intellectual property or government secrets.
The manipulation of the Ethernet connector appeared to be
similar to a method also used by the U.S. National Security Agency,
details of which were leaked in 2013. In e-mails, Appleboum and his team
refer to the implant as their “old friend,” because he said they had
previously seen several variations in investigations of hardware made by
other companies manufacturing in China.
In Bloomberg Businessweek’s
report, one official said investigators found that the Chinese
infiltration through Supermicro reached almost 30 companies, including
Amazon.com Inc. and Apple Inc. Both Amazon and Apple also disputed the
findings. The U.S. Department of Homeland Security said it has “no reason to doubt” the companies’ denials of Bloomberg Businessweek’s reporting.
People familiar with the federal investigation into the
2014-2015 attacks say that it is being led by the FBI's cyber and
counterintelligence teams, and that DHS may not have been involved.
Counterintelligence investigations are among the FBI's most closely held
and few officials and agencies outside of those units are briefed on
the existence of those investigations.
Appleboum said that he's
consulted with intelligence agencies outside the U.S. that have told him
they've been tracking the manipulation of Supermicro hardware, and the
hardware of other companies, for some time.
In response to the Bloomberg Businessweek
story, the Norwegian National Security Authority said last week that it
had been "aware of an issue" connected to Supermicro products since
June. It couldn’t confirm the details of Bloomberg's reporting,
a statement from the authority said, but it has recently been in
dialogue with partners over the issue.
Hardware manipulation is
extremely difficult to detect, which is why intelligence agencies invest
billions of dollars in such sabotage. The U.S. is known to have
extensive programs to seed technology heading to foreign countries with
spy implants, based on revelations from former CIA employee Edward
Snowden. But China appears to be aggressively deploying its own
versions, which take advantage of the grip the country has over global
technology manufacturing.
Three security experts who have analyzed
foreign hardware implants for the U.S. Department of Defense confirmed
that the way Sepio's software detected the implant is sound. One of the
few ways to identify suspicious hardware is by looking at the lowest
levels of network traffic. Those include not only normal network
transmissions, but also analog signals -- such as power consumption --
that can indicate the presence of a covert piece of hardware.
In
the case of the telecommunications company, Sepio's technology detected
that the tampered Supermicro server actually appeared on the network as
two devices in one. The legitimate server was communicating one way, and
the implant another, but all the traffic appeared to be coming from the
same trusted server, which allowed it to pass through security filters.
Appleboum said one key sign of the implant is that the
manipulated Ethernet connector has metal sides instead of the usual
plastic ones. The metal is necessary to diffuse heat from the chip
hidden inside, which acts like a mini computer. "The module looks really
innocent, high quality and 'original' but it was added as part of a
supply chain attack," he said.
The goal of hardware implants is to
establish a covert staging area within sensitive networks, and that's
what Appleboum and his team concluded in this case. They decided it
represented a serious security breach, along with multiple rogue
electronics also detected on the network, and alerted the client's
security team in August, which then removed them for analysis. Once the
implant was identified and the server removed, Sepio's team was not able
to perform further analysis on the chip.
The threat from hardware implants “is very real,” said Sean
Kanuck, who until 2016 was the top cyber official inside the Office of
the Director of National Intelligence. He's now director of future
conflict and cyber security for the International Institute for
Strategic Studies in Washington. Hardware implants can give attackers
power that software attacks don’t.
“Manufacturers that overlook
this concern are ignoring a potentially serious problem,” Kanuck said.
“Capable cyber actors -- like the Chinese intelligence and security
services -- can access the IT supply chain at multiple points to create
advanced and persistent subversions.”
One of the keys to any
successful hardware attack is altering components that have an ample
power supply to them, a daunting challenge the deeper into a motherboard
you go. That's why peripherals such as keyboards and mice are also
perennial favorites for intelligence agencies to target, Appleboum said.
In
the wake of Bloomberg's reporting on the attack against Supermicro
products, security experts say that teams around the world, from large
banks and cloud computing providers to small research labs and startups,
are analyzing their servers and other hardware for modifications, a
stark change from normal practices. Their findings won't necessarily be
made public, since hardware manipulation is typically designed to access
government and corporate secrets, rather than consumer data.
National
security experts say a key problem is that, in a cybersecurity industry
approaching $100 billion in revenue annually, very little of that has
been spent on inspecting hardware for tampering. That's allowed
intelligence agencies around the world to work relatively unimpeded,
with China holding a key advantage.
“For
China, these efforts are all-encompassing,” said Tony Lawrence, CEO of
VOR Technology, a Columbia, Maryland-based contractor to the
intelligence community. “There is no way for us to identify the gravity
or the size of these exploits -- we don't know until we find some. It
could be all over the place -- it could be anything coming out of China.
The unknown is what gets you and that's where we are now. We don't know
the level of exploits within our own systems.”
— With assistance by Scott Moritz, and Gwen Ackerman
No comments:
Post a Comment