IoT
IoT
IT Leadership // Security & Risk Strategy
News
2/9/2016
09:06 AM
50%
50%
RELATED EVENTS
Stop Cyber Attacks with Threat Intelligence
Aug 30, 2016
In this informative webinar on August 30th you will hear security experts discuss practical ways t ...Read More>>

BIOS Hack Detection Added To Dell Enterprise Security Suite

With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.

10 Stupid Moves That Threaten Your Company's Security
10 Stupid Moves That Threaten Your Company's Security
(Click image for larger view and slideshow.)

Hacking a Basic Input/Output System (BIOS), the firmware that runs when a computer boots up, was once considered a capability strictly limited to the domain of secretive government agencies. But last year, security researchers found that millions of machines contain basic BIOS vulnerabilities that let anyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to Wired.

On Feb. 4, Dell announced the availability of a cloud-based security tool designed to protect a computer's BIOS by verifying its integrity after bootup. The post-boot BIOS verification tool will be integrated on Dell commercial PCs with the purchase of the Dell Data Protection | Endpoint Security Suite Enterprise license. According to a Dell spokesperson, pricing is dependent on volume licensing.

The new tool will use a cloud-based environment to compare and test individual BIOS images against official images held by Dell in its BIOS lab. When deployed in an enterprise, the tool doesn't interfere with individual users' ability to boot their machines. Rather, if a problem is found, the customer's IT administrator will get an alert and the organization can choose how to handle it.

[ Which technologies will matter most to IT this year? Read Hot Tech Trends To Watch In 2016.]

Here's how Dell described it in a prepared statement:

The new BIOS verification functionality uses a secure cloud environment to compare and test an individual BIOS image against the official measurements held in the Dell BIOS lab. By conducting this test in an off-device environment, users can be assured that the post-boot image is not compromised as the testing takes place in a secure cloud platform and not on a potentially infected device. The verification helps extend security throughout the entire device lifecycle and provides greater visibility for administrators wanting to stop malicious BIOS attacks.

The BIOS verification feature is initially available on Dell's commercial PCs with a 6th Generation Intel chipset. These include the Latitude PCs, recently announced at CES, as well as select Dell Precision, OptiPlex, and XPS PCs. Dell Venue Pro tablets will also get the BIOS check when the enterprise security suite is purchased.

(Image: nikauforest/iStockphoto)

(Image: nikauforest/iStockphoto)

In November 2015, Dell integrated artificial intelligence and machine learning technology from Cylance into its Dell Data Protection | Endpoint Security Suite Enterprise. The suite is available for Dell commercial PCs and can be used as a security tool across heterogeneous IT environments. Although the Cylance and BIOS tools are currently only available for Dell Data Protection | Endpoint Security Suite Enterprise customers, a Dell spokesperson told InformationWeek, "We are evaluating expanding this to a larger part of the Dell portfolio in the future."

Dell's Brett Hansen, executive director of data security solutions, said in a prepared statement, "With new malware variants possessing the ability to reinstall themselves within the BIOS, organizations need a more sophisticated way to know that their systems have not been compromised. Dell's unique post-boot BIOS verification technology for its commercial PCs gives IT the assurance that employees' systems are secure every time they use the device."

Hansen may be referring to the revelations that came out of the Hacking Team documents that were uncovered in July 2015. Trend Micro said at the time that "Hacking Team uses a Unified Extensible Firmware Interface (UEFI) BIOS rootkit to keep their Remote Control System (RCS) agent installed in their targets' systems. This means that even if the user formats the hard disk, reinstalls the OS, and even buys a new hard disk, the agents are implanted after Microsoft Windows is up and running."

Other efforts have been made to address this sort of PC vulnerability. Intel provides a system management tool that can protect the boot layer in PCs. Using this tool, administrators can remotely start a PC, fix the boot layer, and then shut down the PC. HP has included a secure boot tool in PCs, but it is aimed at individual users. Dell has extended these tools to the enterprise arena, where they have not been seen before.

Rising stars wanted. Are you an IT professional under age 30 who's making a major contribution to the field? Do you know someone who fits that description? Submit your entry now for InformationWeek's Pearl Award. Full details and a submission form can be found here.

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
larryloeb
50%
50%
larryloeb,
User Rank: Author
2/10/2016 | 5:39:11 AM
Re: IT
My understanding is that they reflash it from a known good image.
mak63
50%
50%
mak63,
User Rank: Ninja
2/9/2016 | 9:26:34 PM
IT
"Rather, if a problem is found, the customer's IT administrator will get an alert and the organization can choose how to handle it."
Does anyboody have any experience how the Dell Data Protection | Endpoint Security Suite handle an infected Bios?
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 14, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.