Breaking
February 5, 2025

Hardware supply chain threats can undermine your endpoint infrastructure | usagoldmines.com

Global IT infrastructure has become increasingly interconnected and interdependent. As a result, operational resilience has continued to climb up CISOs’ agendas. While organizations have matured their handling of software threats, many are struggling with poor visibility and inadequate tools to defend against lower-level threats targeting hardware and firmware, which is proving to be a barrier to resilience.

Supply chain attacks can come in many forms, from ransomware groups compromising suppliers’ infrastructure, to tampering with hardware and firmware. Beyond disruption, the reason why these attacks are so damaging is because they undermine the hardware and firmware foundations of devices, often in ways that are difficult to detect and fix, meaning that software and data cannot be trusted to be secure.

Regulators have begun to move to strengthen supply chain security. The UK has implemented new IOT cybersecurity regulations and is drafting a Cyber Security and Resilience Bill to “expand the remit of regulation to protect more digital services and supply chains”. In the US, Executive Order 14028 accelerated the development of software supply chain security requirements for government procurement, explicitly including firmware. The EU is introducing new cyber security requirements at every stage of the supply chain, starting with software and services with the Network and Information Systems (NIS2) directive, and extending to devices themselves with the Cyber Resilience Act to ensure safer hardware and software.

A survey from HP Wolf Security found that 30% of UK organizations say that they or others they know have been impacted by state-sponsored actors trying to insert malicious hardware or firmware into PCs or printers, highlighting the need to address physical device security risks.

Hardware and firmware attacks have major ramifications

The impact of failing to protect the integrity of endpoint hardware and firmware is high. A successful compromise at these lower layers can hand attackers unparalleled visibility and control over a device. The attack surface exposed by hardware and firmware has been a target for skilled and well-resourced threat actors like nation-states for years, offering a stealthy foothold below the operating system (OS). But as the cost and skill of attacking hardware and firmware falls, this capability is trickling down into the hands of other bad actors.

Given the stealthy nature and complexity of firmware threats, real-world examples are not as frequent as malware targeting the OS. Examples like LoJax, in 2018, targeted PC UEFI firmware to survive OS reinstalls and hard drive replacements on devices lacking protection. More recently, the BlackLotus UEFI bootkit was designed to bypass boot security mechanisms and give attackers full control over the OS boot process. Other UEFI malware such as CosmicStrand can launch before the OS and security defenses, allowing attackers to maintain persistence and facilitate command-and-control over the infected computer.

Firms are also concerned about attempts to tamper with devices in transit, with many reporting being blind and unequipped to detect and stop such threats. 75% of UK organizations say they need a way to verify hardware integrity to mitigate the threat of device tampering.

Maturing the approach to endpoint hardware and firmware security

In recent years, IT teams have gotten better at managing and monitoring the software security configuration of devices, and are improving their ability to track software provenance and supply chain assurance. Now, it’s time to bring the same level of maturity to managing and monitoring hardware and firmware security across the entire lifespan of endpoint devices.

Organizations can start by taking the following steps:

  • Securely manage firmware configuration throughout the lifecycle of a device, using digital certificates and public-key cryptography. By doing so, administrators can begin managing firmware remotely and eliminate weak password-based authentication.
  • Make use of vendor factory services to enable robust hardware and firmware security configurations right from the factory
  • Adopt Platform Certificate technology to verify hardware and firmware integrity once devices have been delivered
  • Monitor ongoing compliance of device hardware and firmware configuration across your fleet of devices – this is a continuous process that should be in place as long as devices are in use.

Ultimately, endpoint security depends on strong supply chain security, which starts with the assurance that devices, whether PCs, printers, or any form of IoT, are built and delivered with the intended components. This is why organizations should increasingly focus on securing the hardware and firmware foundations of their endpoints, by managing, monitoring and remediating hardware and firmware security throughout the lifetime of any device in their fleet.

We’ve featured the best online cybersecurity course.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Apple Faces Potential App Store Antitrust Probe in China Tim Hardwick | usagoldmines.com

WhatsApp Users Can Now Send Images and Voice Messages to ChatGPT Tim Hardwick | usagoldmines.com

Threads Now Lets You Share Custom Feeds – Here's How Tim Hardwick | usagoldmines.com

This new Apple Watch and USB-C charging cable looks like my ultimate travel accessory, but I’m less ...

Marvel strongly denies using AI in The Fantastic Four: First Steps' new poster, but I'm not buying i...

A worrying security flaw could have left Microsoft SharePoint users open to attack | usagoldmines.c...

Age of Empires 2: Definitive Edition and Age of Mythology: Retold are coming to PS5 this year | usa...

The Google Pixel 9a freebies have seemingly leaked, but there’s one notable omission | usagoldmines...

Tech deals in 2025: navigating ‘ghost’ discounts and fake reviews | usagoldmines.com

Adobe's AI assistant can now decipher contract jargon in your PDFs | usagoldmines.com

Future AirPods Pro could swap the touch-sensing swipe control for something smarter, and it sounds l...

Google TV carries out a major cull of its free channels – and it's bad news for Bob Ross fans | usa...

The next Battlefield game will arrive by April 2026, here’s how you could play it early dash.wood@fu...

The Samsung Galaxy S25 Ultra’s S Pen change is getting ever more confusing and disappointing | usag...

Daisy the AI grandma has just been unleashed on scammers - here are the satisfying results erichs211...

NYT Strands hints and answers for Thursday, February 6 (game #340) | usagoldmines.com

NYT Connections hints and answers for Thursday, February 6 (game #606) | usagoldmines.com

Quordle hints and answers for Thursday, February 6 (game #1109) | usagoldmines.com

If this Xiaomi 15 Ultra camera rumor is true, it could rival the Galaxy S25 Ultra jamie.richards@fut...

Google, Nvidia and Intel could all see new China antitrust cases | usagoldmines.com

Monster Hunter Wilds' second open beta kicks off this week, will let players fight flagship monster ...

As Internet enshittification marches on, here are some of the worst offenders Ars Staff | usagoldmin...

A worrying security flaw could have left Microsoft SharePoint users open to attack | usagoldmines.c...

Many Americans still don’t understand how easily IoT devices can get bricked Scharon Harding | usago...

Canon’s rumored PowerShot V1 point-and-shoot could hit the sensor sweet spot – and be first of two n...

Unlocking business transformation: the power of marketing data and technology | usagoldmines.com

We're probably getting Madden and EA Sports FC on Nintendo Switch 2, as EA's CEO says the franchises...

Garmin Fenix 7 gets a public beta update with heart rate tweak and map fixes, but installing it will...

3 apps to get before buying a new computer | usagoldmines.com

What’s cheaper than Microsoft 365? An Office lifetime license. | usagoldmines.com

Norton 360 Deluxe review: Excellent value and strong protection | usagoldmines.com

Best USB-C cables 2025: Get quality charging and data transfers | usagoldmines.com

If you loved Hacks, don't miss this sleeper-hit sitcom that's 97% positive on Rotten Tomatoes | usa...

ChatGPT on WhatsApp can now see, hear, and remember your conversations from elsewhere erichs211@gmai...

How to Get Your Hands on One of Nvidia's New Graphics Cards Michelle Ehrhardt | usagoldmines.com

Five Asian Sauces That Make Everything Taste Better Allie Chanthorn Reinmann | usagoldmines.com

Nomad Launches Universal Cable That Can Charge Apple Watch and USB-C Devices Juli Clover | usagoldmi...

Sonos Plans to Launch Apple TV-Like Streaming Box Juli Clover | usagoldmines.com

Could the US Government Buy TikTok? Michelle Ehrhardt | usagoldmines.com

Baking Soda and Vinegar Are Good for Cleaning, Just Not Together Lindsey Ellefson | usagoldmines.com

Samsung is Working on a Tri-Fold Smartphone Juli Clover | usagoldmines.com

Drones are now launching drones to attack other drones in Ukraine Nate Anderson | usagoldmines.com

Galaxy S25 Ultra’s Pre-Order Final Days are Here: $900 Trades, Free Storage Upgrades, More Kellen | ...

A Room-by-Room Checklist of All the Things You’re Forgetting to Clean Lindsey Ellefson | usagoldmine...

Microsoft Has Quietly Removed Instructions for Updating Your ‘Unsupported’ PC to Windows 11 Pranay P...

Check Out Doom Running on Apple's Lightning to HDMI Adapter Juli Clover | usagoldmines.com

Is this 4K projector inspired by turtles? Fujifilm's latest UST projector has a folded rotatable pop...

RTX 5060 cards could arrive by March, says supplier | usagoldmines.com

RTX 5090 cards are dying after Nvidia’s recent driver update | usagoldmines.com

AMD’s monster 9955HX3D gaming laptops really are coming soon | usagoldmines.com

Samsung’s massive 4TB portable SSD is $220 off right now | usagoldmines.com

Anker’s USB-C power bank with built-in cable is a steal for just $13 | usagoldmines.com

Tired of reading contracts? Adobe Acrobat’s AI will do it for you | usagoldmines.com

AI PCs powered by Snapdragon: The new office assistant you can’t live without | usagoldmines.com

Smarter security: How AI PCs powered by Snapdragon are enabling modern IT management | usagoldmines...

Performance, unplugged: How PCs powered by Snapdragon are taking the modern workplace to the next le...

Get this 27-inch Alienware 1440p IPS gaming monitor for just $200 | usagoldmines.com

Forget performance versus efficiency, PCs powered by Snapdragon let you have both | usagoldmines.co...

Comparing smart lock quality & security? Look for these standards | usagoldmines.com

Keep your PC’s storage free of wasted space with CCleaner, now just $15 | usagoldmines.com

Firefox surprises no one by adding AI to the browser | usagoldmines.com

Best antivirus software 2025: Keep your PC safe from malware, spyware, and more | usagoldmines.com

Marvel SNAP is Back With New Season, New Cards Tim | usagoldmines.com

New info about Sonos' streaming box sounds like a dream product, apart from the 2 horrendous flaws ...

Framework Laptop’s RISC-V board for open source diehards is available for $199 Andrew Cunningham | u...

Internet Archive played crucial role in tracking shady CDC data removals Ashley Belanger | usagoldmi...

35 of the Best Movies People Think Are Boring Ross Johnson | usagoldmines.com

Apple’s New ‘Invites’ App Is Coming for Partiful Jake Peterson | usagoldmines.com

Swear at Google Until It Hides AI Search Results Justin Pot | usagoldmines.com

The Best Strategy for Buying a Car When You’re Paying With Cash Jeff Somers | usagoldmines.com

Apple Heart Month Activity Challenge Launching on Valentine's Day Juli Clover | usagoldmines.com

Did extreme overclockers inspire Microsoft to develop closed loop liquid cooling for data centers? I...

Another mini PC with a Ryzen AI 9 HX CPU has emerged, and not only does it support four 4K monitors,...

NYT Strands hints and answers for Wednesday, February 5 (game #339) | usagoldmines.com

Quordle hints and answers for Wednesday, February 5 (game #1108) | usagoldmines.com

NYT Connections hints and answers for Wednesday, February 5 (game #605) | usagoldmines.com

DeepSeek became the world's most popular AI term for 24 hours when it caused the biggest drop ever i...

$42B broadband grant program may scrap Biden admin’s preference for fiber Jon Brodkin | usagoldmines...

Europe has the worst imaginable idea to counter SpaceX’s launch dominance Eric Berger | usagoldmines...

RTX 5090 cards are dying after Nvidia’s recent driver update | usagoldmines.com

February 2025 Android Security Update Available for Google Pixel Devices Kellen | usagoldmines.com

Partiful Calls Apple a Copycat for New Invites App Juli Clover | usagoldmines.com

Irony alert: Anthropic says applicants shouldn’t use LLMs Kyle Orland | usagoldmines.com

Congress Might Ban DeepSeek Michelle Ehrhardt | usagoldmines.com

Opera’s New Browser Is Built to Break Your Doomscrolling Habit Khamosh Pathak | usagoldmines.com

Apple Raises Monthly AppleCare+ Subscription Price for All iPhones Juli Clover | usagoldmines.com

Testing Apple's New Invites App for Event Planning Juli Clover | usagoldmines.com

Warframe’s next big update was apparently designed for me personally, as it includes a David Bowie-t...

Meta reveals what kinds of AI even it would think too risky to release | usagoldmines.com

Better together: AI, no-code, and the human workforce | usagoldmines.com

Mastering data overload by implementing AIOps | usagoldmines.com

Phishing campaign targets prominent X users, accounts at risk | usagoldmines.com

Apple Music’s year-round alternative to Spotify Wrapped has just landed – here’s how to find it | u...

Nvidia RTX 5090 seemingly has a spanner thrown in the works by new graphics driver, but we should be...

New EU Chat Control makes scanning encrypted chats optional – but privacy experts are still worried ...

An all-digital PS6 doesn't seem possible, according to ex-PlayStation boss Shawn Layden: 'I think it...

GrubHub reveals massive data breach - customers, drivers, businesses all affected, here's what we kn...

Meta sets Oculus Quest headset shelf-life at six years, but there's still hope that the Meta Quest 2...

Anthropic has a new security system it says can stop almost all AI jailbreaks luke.hughes@futurenet....

The Nothing Phone 3a could borrow the iPhone 16’s best feature – and I think it’s a great idea jamie...

Leave a Reply