LightEater Demo: Stealing GPG keys/emails in Tails via remote firmware infection





Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Jun 5, 2015

In this video we infect a MSI B85M P33 "Military Grade" motherboard's BIOS via remote access.

We insert a "LightEater" backdoor, that is capable of subverting the Tails live OS, and stealing GPG keys, GPG key passphrases, and decrypted GPG emails

The LightEater malware runs in System Management Mode (SMM) which is the most privileged execution domain on x86 systems. It is able to subvert all software that runs at a lower privilege level (e.g. hypervisors/virtual machine monitors, OS kernels, and applications)

The LightEater malware could do any attack, we just chose to show these particular capabilities on this particular system in this video. See our other videos for other LightEater demonstrations.

For more about BIOS/SMM vulnerabilities, go to legbacore.com/Research.html


When autoplay is enabled, a suggested video will automatically play next.

Up next

to add this to Watch Later

Add to

Loading playlists...