Loading...

LightEater Demo: Stealing GPG keys/emails in Tails via remote firmware infection

36,810 views

Loading...

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Jun 5, 2015

In this video we infect a MSI B85M P33 "Military Grade" motherboard's BIOS via remote access.

We insert a "LightEater" backdoor, that is capable of subverting the Tails live OS, and stealing GPG keys, GPG key passphrases, and decrypted GPG emails

The LightEater malware runs in System Management Mode (SMM) which is the most privileged execution domain on x86 systems. It is able to subvert all software that runs at a lower privilege level (e.g. hypervisors/virtual machine monitors, OS kernels, and applications)

The LightEater malware could do any attack, we just chose to show these particular capabilities on this particular system in this video. See our other videos for other LightEater demonstrations.

For more about BIOS/SMM vulnerabilities, go to legbacore.com/Research.html

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...