Threat Reports

"The Finspy Who Hacked Me"

Eclypsium Threat Report September 2021 Firmware The Finspy Who Hacked Me

Shaken, and stirred. That’s how a lot of us feel after so much news this month centered around a common theme, that once distilled, looks like this: Spies continue to target devices at their lowest layers in order to best position themselves for the longest persistence and best access to data. There are a lot more cyber spy outfits than many realize. It might be Q Cyber (aka NSO Group) embedding into WhatsApp, or even into the Apple device’s firmware you are holding in your hand right now (did you update this week?) Or it might be Hacking Team (aka Memento Labs, and still actively targeting reporters’ phones in the US, Morocco, and Ethiopia). Perhaps it is Vupen (now “Zerodium”) selling low-level zero-day exploits to governments, or it might be Mollitiam Industries in Spain, helping soldiers in Colombia intercept calls. Whether it’s an exploited vulnerability or whether it’s via a supply chain attack, or whether it’s trojan software, embedding at the device level is the name of the game, and even more so these last five years:

  • November 2016 – Firmware authors for major Chinese phone manufacturers embed backdoor
  • December 2016 –  Malware found in the firmware of 26 different Android smartphones
  • July 2017  – Triada banking trojan firmware found on Android smartphones
  • March 2018 – Even more Triada malware found in 42 different models
  • May 2018 – Cosiloon trojan found in the firmware of 141 Android cellphones
  • January 2019 –  Pre-installed malware discovered on Alcatel smartphone.
  • June 2019 – Unremovable malware found on 20K Android phones in Germany
  • January 2020 – Preinstalled malware on Assurance Wireless (Virgin Mobile) phones in U.S.
  • September 2021 – Pushbutton phones in Russia backdoored with spy software
  • September 2021 – GriftHorse campaign infects tens of millions globally on Android phones

And this brings us to FinSpy, the discovery of a capability that took researchers 8 months to unpack, resulting in a 300-page report documenting a complex, (truly) sophisticated, and powerful new spy campaign. A spy company called Gamma in Munich, Germany, which had already been raided by prosecutors after selling low-level spyware to the Turkish government had a new trick: embedding itself on Windows, Linux, and Mac devices at the MBR, and in some cases, at the UEFI/boot level. In operation for years, this capability has allowed customers of Gamma (aka FinPhisher) to spy indefinitely on their targets by persisting at such a low level, hardly anything could detect it. These new bookits that target UEFI boot loaders and the legacy MBR boot mechanism serve to remind us just how powerful and desirable these low-level tactics are.

Indeed this is one reason why Microsoft is putting so much emphasis on new technologies in Windows 11. Everything from Secured-Core, to TPM and all else in between, including new Defender capabilities. Yet, as this new Eclpysium research and quick video demonstration clearly show, all it takes is one click to go from a spearphishing email to a bootkit level implant. This, even on a new Secured-Core PC with every OS-level security control possibly related to firmware enabled; and that’s if you are lucky enough to even have a TPM in your device. As this study shows, less than half of 30 million Windows devices found in 60,000 organizations are even capable of enabling this feature. In fact, pretty much every Windows OS for the last decade or so is vulnerable to precisely this style of attack.

So what can you do to thwart a “FinSpy Who Hacked Me” style attack? Enable Secure Boot to ensure only signed bootloaders can run. Even better? Make sure your devices that have this feature enabled, aren’t vulnerable to myriad vulnerabilities in the boot process, such as BootHole. Patch the devices that are vulnerable. Even better than that? Be able to detect an attack like this when it happens by continuously monitoring the integrity of all UEFI components with Eclypsium.

Way too much trust is being placed in our devices and the integrity of the firmware that allows the operating system, and every single application and security control running on it, to function.

We know it. James Bond knows it. And you know it too.