added about 1 month ago by @icyflame ARCHIVES
security china surveillance supply-chain hardware hack
Two people with direct knowledge said the manipulation combined two pieces of code: The first was embedded in instructions that manage the order of the startup and can’t be easily erased or updated. That code fetched additional instructions that were tucked into the BIOS chip’s unused memory, where they were unlikely to be found even by security-conscious customers. When the server was turned on, the implant would load into the machine’s main memory, where it kept sending out data periodically.
Cutouts is an open source application. Code licensed under the MIT license. Copyright 2018 Siddharth Kannan