Breaking News
Home / Hardware / Intel’s Most Dangerous Piece of Hardware

Intel’s Most Dangerous Piece of Hardware

Intel’s management engine gives backdoor access to every part of your machine.

Five years ago, Intel rolled out something called the Management Engine (ME). It is a completely separate computing environment for Intel chipsets, which gives almost unlimited access to your computer. ME can access your network, operating system, memory and cryptography engine. It can access your computer remotely, even when the computer is off. All of this is underscored by the fact that we don’t know what ME is up to, and there’s no way to look at the code. What is certain, is that once a hacker manages to break into the Management Engine, every Intel computer will have a massive security and privacy problem. Hackaday described Intel’s Management Engine as “the single most dangerous piece of computer hardware ever created” in an article published this weekend.

If this sounds scary to you, you’ll be happy to hear there’s now a way to disable ME on your computer. When the engine was first rolled out in GM45 chipsets, it could be removed physically, because it was situated on a chip separate from the northbridge. For core i3/i5/i7 processors however, the Management Engine is integrated into the chip. Physically removing it is impossible, but some efforts to disable it have been at least partially successful. Those partial successes have, until very recently, had a major drawback. If disabled, ME does not receive a valid Intel signature form the computer, and when this happens, the computer auto shuts down after 30 minutes.

A few months ago however, hacker Trammel Hudson discovered that if he deleted ME’s first page, or memory block, his Thinkpad didn’t shut down. This led two other hackers,  Nicola Corna and Frederico Amedeo Izzo to create a script which utilized the exploit to disable ME. In essence, the engine thinks it’s still running, while not really doing anything. With some extra wires, a BeagleBone single board computer, and a SOIC-8 chip, the hackers were able to completely shut down ME. The exploit is known to work on Sandy Bridge and Ivy Bridge processors. It should work on Skylake processors, and Haswell and Broadwell are untested.

About PCA

Check Also

sony

Sony is restarting production of vinyl records

Contrary to what the children of baby boomers might believe, vinyl records are far from ...


Fatal error: Uncaught exception 'Exception' with message 'Cache directory not writable. Comet Cache needs this directory please: `/home/pcapk/public_html/wp-content/cache/comet-cache/cache/http/pcapk-org`. Set permissions to `755` or higher; `777` might be needed in some cases.' in /home/pcapk/public_html/wp-content/plugins/comet-cache/src/includes/traits/Ac/ObUtils.php:320 Stack trace: #0 [internal function]: WebSharks\CometCache\Classes\AdvancedCache->outputBufferCallbackHandler('<!DOCTYPE html>...', 9) #1 /home/pcapk/public_html/wp-includes/functions.php(3595): ob_end_flush() #2 [internal function]: wp_ob_end_flush_all('') #3 /home/pcapk/public_html/wp-includes/plugin.php(525): call_user_func_array('wp_ob_end_flush...', Array) #4 /home/pcapk/public_html/wp-includes/load.php(638): do_action('shutdown') #5 [internal function]: shutdown_action_hook() #6 {main} thrown in /home/pcapk/public_html/wp-content/plugins/comet-cache/src/includes/traits/Ac/ObUtils.php on line 320