FAQ You may have seen some headlines about a supply-chain backdoor in millions of Gigabyte motherboards. Here’s the lowdown.
What’s the problem?
Gigabyte ships a wide range of motherboard models that come with an App Center utility, which is supposed to keep the system’s firmware, drivers, and related software up to date. It checks for updates and offers to fetch and install them, saving people from having to do it by hand or getting deep into their BIOS settings. Trouble is, the way Gigabyte implemented this potentially leaves people at risk of infection.How so?
The UEFI firmware Gigabyte ships with its motherboards performs a number of actions as the system boots. On Windows PCs, this includes quietly writing a Windows program that’s embedded in the firmware to disk asGigabyteUpdateService.exe
in the OS’s system32
folder, and running it. That .exe sets itself up as a Windows service and then fetches from the internet another executable, and runs it. It fetches that second program from one of these locations:
hxxp://mb.download.gigabyte.com/FileList/Swhttp/LiveUpdate4
hxxps://mb.download.gigabyte.com/FileList/Swhttp/LiveUpdate4
hxxps://software-nas/Swhttp/LiveUpdate4
How does that lead to my Windows PC being infected?
Well, if someone were able to intercept those downloads and replace the fetched code with malicious programs, they’ll achieve code execution on the victim’s Windows box, and be able to commandeer it. Such an attacker could use DNS shenanigans so that requests tomb.download.gigabyte.com
are redirected to a malicious server that hands out malware instead of a legit Gigabyte executable.
One of the URLs uses HTTP, which is easy for a well-placed attacker to intercept, and the other two use HTTPS albeit without proper remote server certificate validation, so again, a man-in-the-middle (MITM) attack would be possible. Someone has to go to some lengths to pull this off. It’s not impossible, but there may be easier ways to infect someone.
And an attacker will likely have to make sure the fetched program passes Windows’ code-signing requirements. The firmware otherwise doesn’t do any checks to see if it’s downloading a legit binary. All in all, it’s not the most secure process, and could lead to the execution of malicious code and the deployment of spyware on an unsuspecting stranger’s machine.