Software vulnerabilities can occur at any level of the tech stack, from the operating system to programming languages to applications, but companies securing their systems against cyberattacks — particularly financial institutions — often overlook firmware, the most fundamental level of software.
Separately,
Eclypsium worked with Vanson Bourne, a tech market research firm, to interview 350 IT security professionals at organizations in the financial sector. Countries represented in the survey included the U.S. (150 respondents), Canada (50) and other countries.
"There is a clear discrepancy between the state of awareness around firmware security and the perception of knowledge that IT departments have," the report says.
Firmware is
In their overview of the security risks presented by firmware, Homeland Security and the Commerce Department pointed to the basic input/output system (BIOS) and its successor technology, unified extensible firmware interface (UEFI), as two notable examples of firmware. The two systems enable the computer to run an operating system, such as Linux distributions or Windows.
Outages or disruptions of GPS signals — sometimes malicious, sometimes not — could quickly knock out computers, ATMs and card networks.
A successful attack against firmware grants threat actors access to one of the most privileged positions within a computer. Attacks conducted using firmware can subvert operating system and hypervisor visibility, bypassing important security systems that firms use to monitor for malicious behavior on their servers and other devices.
Some devices support regular firmware updates, allowing companies to patch known vulnerabilities as they come to light. Other devices can receive only one update in their lifetime, or no updates at all. Often, the process to update firmware is complex, presenting another barrier to patching security holes.
Homeland Security and the Commerce Department are also increasingly concerned about ransomware operated at the level of firmware. In their assessment, the departments identified three examples of ransomware that exploited vulnerabilities in firmware.
One was a 2015 attack dubbed