March 25, 2015 By Shane Schick 2 min read

As security threats go, the LightEater malware contains some of the worst possible elements. It’s easy enough to be used by everyday people, exploits a vulnerability common in the majority of computer systems and can have an effect in about two minutes.

At the CanSecWest security conference taking place in Vancouver, Canada, this week, researchers Xeno Kovah and Corey Kallenberg presented research showing how they discovered basic holes in BIOS chips. This allowed them to infect machines with the LightEater malware, a bootkit that could hit many systems at the same time and gain high levels of access to steal passwords or other data. Wired noted the malicious code could persist even on PCs that were wiped and given a new operating system.

It is important to note here that the LightEater malware is a proof of concept that hasn’t actually been used for criminal purposes. However, in an interview with Threatpost, the researchers said the vulnerability stems from the open-source code within the BIOS of most computers and could allow third parties to hack into the System Management Mode and take over various hardware controls.

In this case, compromising systems via the BIOS would require the attackers to already have remote access to a machine. However, BetaNews observed that similar vulnerabilities have already been exploited by the U.S. National Security Agency. The difference here is that the LightEater malware takes advantage of flaws that are widespread and relatively simple to find.

In theory, the threat disclosed in the CanSecWest presentation could affect anyone, from home users to businesses and governments. However, FierceCIO suggested a great deal of the risk could be mitigated if IT departments simply become more proactive about applying patches and updates to the BIOS. That seems to be the overall message the researchers are trying to convey, too.

A final but critical point was made by SC Magazine, which posited that something like the LightEater malware might be better described as an advanced persistent threat, potentially making it an even higher priority for those aiming to better protect their data from cybercriminal activity. After all, a BIOS is not only central to nearly all hardware, but even a hypothetical illustration of an attack should be taken as seriously as the real thing.

More from

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces.AI in every pocketHaving sophisticated AI…

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today