Christopher Allan Webber

Hard drive firmware exploits

Christopher Allan Webber at

If you want to sleep at night, maybe don't read any articles about the hard drive firmware viruses out there.

Matthew Garrett talked about the possibility of this at last year's LibrePlanet, and I thought it was an interesting technical curiosity, and it sat at the fringes of my mind of "maybe something to worry about". But seeing that it's true, and there are no known escape routes from it... damn.

Debacle, Jason Self likes this.

jrobertson, jrobertson, jrobertson shared this.

Show all 9 replies

Seems so to me. Full disk encryption would probably defeat it but then you'd have to trust booting from another medium.

Dylan at 2015-02-18T05:17:15Z

Does LUKS defeat the NSA's IRATEMONK? That depends on what the evil firmware is doing.

  1. It could listen for a particular pattern of traffic. Ie, a write at minutes 3, 1, 4, 1, 5, 9 ... Once it's sure it's detected the traffic pattern, it could destroy the disk. This could be triggered by eg, hitting a web server at specific times and letting it log. LUKS would be unlikely to defeat this unless it writes all the time or delays writes.

  2. It could pretend that the 6 tb drive is a 2 tb drive, and log every write. So things you think you've deleted, are not deleted. While the log would still be of LUKS encrypted blocks, the key can be obtained later. (See relevant xkcd involving wrenches.)

  3. It could listen for a particular pattern of write traffic and then redirect the next read to deliver other data than the OS requested. Use the method in 1. to trigger, and the web server eventually replies with the LUKS header. Which the NSA can then feed into the supercomputer farm which I understand is down the road from me in Oak Ridge TN, and get to work on brute forcing the keys.

  4. It could wait until day N or load cycle N and brick the drive. Hey, if the evil non-US persons are using our technology, at least it should be a worse version than we have, right?

  5. It could generate head movements that allow disk traffic to be intercepted via acoustics by a van in the street with a directional mic. Possibly triggered by 1. Would still be encrypted if LUKS is used, but now you're really a target for wrench-based followup.

  6. It could wait until reboot N and suddenly the computer is booting into HOMELANDOS and becomes a NSA interception point for all network traffic as well as dumping its entire encrypted partition out the network to be retained forever, since only terrorists use encryption. (Note that HOMELANDOS may helpfully run your real system under virtulization, so you can continue to use the computer.)

These all seems doable, and they're what I could come up with in 5 minutes. I guess the NSA has been working on this longer and with more expertise.

~~ To any NSA and FBI agents reading my posts: please consider whether defending the US Constitution against all enemies, foreign or domestic, requires you to follow Snowden's example. ~~

joeyh at 2015-02-18T14:57:50Z

Jakukyo Friel, Mike Linksvayer, jrobertson, Charles Stanhope and 2 others likes this.

George Standish:

s/hard drive/storage/ flash media would be good as well ;)

Flash media—especially USB—was basically found to be totally vulnerable, untrustworthy, and in need of re-engineering unfortunately.

Kete Foy at 2015-02-18T23:09:47Z

@cwebber@identi.ca here's a write up from one guy exploring his hard disk http://spritesmods.com/?art=hddhack&page=3

Diane Trout at 2015-02-19T03:20:25Z