Gadgetory


All Cool Mind-blowing Gadgets You Love in One Place

Assassination Attempt on AMD by Viceroy Research & CTS Labs

2018-03-13
AMD must cease the sale of Rison and epic chips in the interest of Public Safety that's one of the quotes related to a new CTS Labs research paper on an alleged AMD vulnerability pertaining to its rise in architecture and it follows on the heels of meltdown and Specter reports so the public is now used to this sort of thing it's another report that's laid out in a very familiar fashion to meltdown inspector but we didn't think things lined up quite right with it it seems like something's off so today we'll be exploring the origin of the report the team behind it and their background and we'll be talking about whether or not this is actually a vulnerability you need to worry about before that this video is brought to you by Thermaltake and the view 71 enclosure the view 71 is a full tower case that's capable of fitting three video cards and most configurations it's also one of the better cooling cases in our recent case testing bench lineup the view 71 has hinged a tempered glass doors on either side that make it easy to open and show off and it comes with at least one rain fan though you can get the RGB version if you prefer learn more at the link in the description below so that quote opening this video is a bit histrionic it's hyperbolic and it basically is the tone of the entirety of the paper that cts lab put out and Viceroy research which has an interesting hand in all of this as we'll explore and so what we're looking at here to get everyone up to speed this is a we can make a comparison to meltdown inspector you know about those this is basically an attempt of a research company a cyber security company that was founded last year to show similar problems on AMD Hardware there are four categories of exploit listed the categories are named master key rise and fall come on guys fallout and chimera so each has a section in a white paper that explains the concept of the vulnerability it's got a list of affected processors potential consequences of those at vulnerabilities alleged vulnerabilities and then mitigation options as well although the last section is actually left empty usually three of the exploits require quote that an attacker be able to run a program with local machine elevated administrator privileges accessing the secure processor is done through a vendor supplied driver that is digitally signed while master key quote requires an attacker to be able to reflash the bios with a specially crafted BIOS update this would theoretically be done on a remote system that supports bios flashing from within the OS one of the experts we spoke with we sourced a couple of security folks that we worked with on our meltdown inspector stories brought them back in and said what do you all think of this and for one of them they stated the obvious if you have local administrator privileges already and the ability to flash bios an attacker would be able to install malware on a PC of any kind doesn't matter if it's AMD you're just as vulnerable on Intel it'd be equivalent to leaving your username and password on a post-it note on your monitor someone logging into it and then you claiming that they used a security vulnerability to attack the system where was the vulnerability in the chain that's not to discredit these findings but the thing here is that the entire white paper uses ad hominem attacks and it goes after the company Andy and its partners rather than the technology it's a stark contrast from what we saw with Google's project zero team and meltdown inspector where the entire focus was on technology the worst consequence listed is quote persistent virtually undetectable espionage surviving computer reboots and reinstallation z' of the operating system that's part of master key the rise and fall and fall out exploits could enable an attacker to break into system management mode using flaws in the AMD secure OS and epic bootloader respectively this could in turn be used to enable BIOS flashing for the master key exploit which seems to be the main focus of this paper this is theoretical as the paper opens with quote to ensure public safety all technical details that could be used to reproduce the vulnerabilities have been redacted from the document that means no proofs of concept or sample code and there's I guess one picture of an epic system whose bio screen has been modified via hack to say leet in the corner yes a research favor on security vulnerabilities is using 1337 to demonstrate their hack so all of this so far is in the white paper put up by cts at labs but there's more to it as well get into with Viceroy in a moment for now though there's one final exploit and that's chimera this one has to do with AMD's use of as media chips and cts claims that as media eye sees using the or in the AMD promontory chipset have quote substandard security and no mitigations against exploitation it also states quote they are plagued with security vulnerabilities in both firmware and hardware allowing attackers to run arbitrary code inside of the chip or to reflash the chip with persistent malware CTS claims to have successfully taken advantage of these vulnerabilities but again it requires a local admin access and assigned driver will get to the company's credentials in a moment as those our suspects but let's start with the presentation of this vulnerability by CTS labs contrasting the meltdown inspector whitepapers the CTS labs white paper on claimed and the vulnerabilities is bereft of any example code and is written with a tone that attacks companies rather than addressing the technological flaws that are alleged this is the most concerning as the writing is charged and appears emotionally motivated rather than taking an approach of objectively outlining the exploits and detailing the technology a primary concern is the window of time provided for AMD for Spectre and meltdown these affected intel and the arm basically everybody primarily Spectre meltdown mostly affecting Intel or so far entirely so with those two exploits the CPU and architecture companies had at least 5 to 6 months of private notice of the exploits prior to disclosing them to the public this was to give the company's Intel and the arm time enough to supply patches and work on micro code updates for their architectures so that the general public is not exposed to a wide sweeping zero-day exploit basically so this is quite different though CTS labs actually briefed media and we don't know which outlets yeah because we haven't find that any any source emails on this but the from what CTS Labs has put out there they briefed media first and AMD's second Andy the maker of the processor that's affected was given 24 hours of notice of the finding of this alleged exploit not enough time to do anything so in the best interest of the public as done with meltdown inspector you would give the company some notice so that they can do something so the motive here is suspect that's one of the biggest red flags even if this is a legitimate exploit and it may well be despite the fact that you'd physical access and might as well just pick up the computer and leave at that point even if it's a valid exploit you're still talking about a window of time of 24 hours to respond that's kind of absurd so that's what we've got for the basic presentation of this now the next thing to look at is the aggressive writing this report also focuses on leveraging ad hominem attacks including from the first three pages of the report the following quotes one quote the rise in chipset a core system component that AMD outsourced to a Taiwanese chip manufacturer as media is currently being shipped with exploitable manufacturer backdoors inside another quote we note with concern that AMD is outsourced partner as media is a subsidiary of Asus tech computer a company that has recently been penalized by the Federal Trade Commission for neglecting security vulnerabilities and put under mandatory external security audits for the next 20 years although important not sure that that's relevant for this particular story one of the last two here really puts into perspective though this one in our opinion this is from the researchers the basic nature of these vulnerabilities amounts to complete disregard of fundamental security principles this raises concerning questions regarding security practices auditing and quality controls at AMD and finally for good measure this one quote and these at latest generation Vega GPUs which also have secured processor inside of them are being integrated as deep learning accelerators on self-driving cars this is where you're supposed to be scared because I suppose the link you draw there is that the self-driving cars will kill you or something with her through exploit or accident so it's very peculiar language we're not talking about something where it's a lines of code or proofs of concept being demonstrated that show the issues with these supposed security processor vulnerabilities inside of AMD CPUs this is ad hominem it is appealing to emotion it's an attack that looks more motivated to drive perhaps investment or the lack thereof then to drive actual security advancement of the AMD CPUs and again that's not to discredit CTS labs findings these exploits from the experts we've spoken with do actually appear to have some basis in reality they could be real you could actually have security vulnerabilities and rise in CPUs the problem is the presentation and the fact that you need such low level access to the system basically being next to it in order to do anything with these exploits and this is a bit further than what we saw with specter and meltdown so there's almost zero focus on technical data in here and the presentation of the code in its entirety basically boils down to a BIOS screen displaying the word leet this is where things get interesting as for the CTS Labs website the posted legal disclaimer has some boilerplate cya language but also has some questionable language in one part the disclaimer states quote the report and all statements contained herein are opinions of cts and are not statements of fact another legal statement notes although we have a good faith belief in our analysis and believe it to be objective and unbiased you're advised that we may have either directly or indirectly an economic interest in the performance of the securities of the these products are subject to our reports now some of this just looks like boilerplate so it's not necessarily a red flag and in fact again cts could have found something real but digging further we get to the more interesting stuff especially as we move towards Viceroy we contacted security experts in the industry and overall discovered that cts Labs has not yet been heard of by any of our contacts we worked with on previous stories so that's the first item of note Andy's own statement insinuates similar unfamiliarity with CTS Labs where the company says quote we have just received a report from a company called CTS labs claiming there are potential security vulnerabilities related to certain processors of ours we are actively investigating and analyzing its findings this company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings when we first saw the press release about this we reached out to the listed bevel PR contact number this is a third-party PR agency supposedly that cts Labs has hired for handling its contact during this dilemma and when we reached out to the phone number provided which also has a name listed on the press release what we ended up with was no response the phone goes straight to voicemail and the inbox is full it's been a busy day though so perhaps this is fair we won't show it on screen but looking through personal social media pages of employees there we were able to find that that bevel PR appears to have been founded in 2017 quite recently and that it's staffed primarily or entirely by one individual will go with primarily we have also reached out to the individual through other forms of contact and have thus far received no response and speaking from experience we've never heard of bevel PR before but their webpage does indicate that they have some experience working with AI SEOs and hedge funds which led us to the next part of what we were looking into CTS Labs is a new company the CTS labs comm domain name was registered on June 25th 2017 around when the meltdown exploits were privately revealed to Intel and the flaws calm the domain that lists the exploit whitepaper was registered on February 22nd of 2018 both are GoDaddy domains there is an Intel flaws website as well but we contacted the owner and there's no affiliation the owner is an individual and was completely bewildered by our cold call so we'll rule that one out CTS Labs lists one urine luke Silberman as the chief financial officer we found SEC documents containing information on Luke Silberman and noted that he has affiliation supposedly with nine Wells Capital Management LLC based on what we saw online on his own profile and in other documents this is a hedge fund and investment management firm we attempted to call the phone numbers that listed for Luke Silberman on official government documents but found that the numbers were disconnected or invalid the CTS labs at YouTube account was registered three days ago at time of filming and presently has disabled comments on videos the default is enabled by the way so they were manually toggled off probably this is where it gets even better the video is published by CTS labs are even using Shutterstock stock photos for their green screen look familiar these videos were not shot in real offices at least not ones owned by CTS labs unless they're also in the business of stock photography for shutterstock as for the logo for CTS labs it appears that it's using a modified version of a shutterstock electronic shield logo with a slightly modified design the company looks suspect overall it's possible that this is legitimately a new security firm it's also possible that because they're security experts and not designers they bought and modified some stock images from Shutterstock perhaps for the video backgrounds they thought that it looked better than a white wall or a wood wall or anything like that and they went with something from Shutterstock but the point is that you consider all of this information with the time of publication the window of publication and the verbage and tone used in the documents upon launch and we have something that just seems wrong on that note we must now look to viceroy research Viceroy was the first group to report in great detail on the alleged AMD vulnerability and managed to publish a 25 page PDF almost immediately upon disclosure of these supposed to exploits we believe this was pre-written the PDF is entitled quote AMD the obituary and seems motivated to inflict fear and caused damage some quotes state for instance just one Rison chip could endanger an entire enterprise network or another and these flawed chips are components in defense products just to scare you one last quote that everyone can appreciate quote we believe AMD is worth 0.00 dollars and will have no choice but to file for chapter 11 bankruptcy in order to effectively deal with the repercussions of recent discoveries so at best this is fear-mongering at worst and I'm using viceroys own words here they may have some sort of financial entanglement with the situation and again that's their words I'll read it for you Viceroy joined business day for an interview in 2017 when asked by the magazine what Viceroy is the group reportedly responded quote we're an independent research group based in the u.s. our focus is to research entities that we find to have signs of accounting irregularities and potential fraud when asked why they do this the group stated quote we take a financial position in our research and our readers should assume we have a position on the stock the group also remains anonymous according to this business day interview anyway so if we assume that Viceroy has a position on an these stock as they've literally instructed us to do we would also assume that it's a short position this is kind of the speculation that's going on right now so Andy's recent uptrend would impact that negatively if you had a short position on AMD and we aren't making any leaps here Viceroy literally said to assume that they have a position on what they're reporting on so that's what we're doing the ravings of the Viceroy paper really make them out to look like a deranged a lunatic someone one during the streets at night scrolling things on the wall pinning up different newspaper articles and connecting them with read strain this the paper if you want something genuinely entertaining to read but somewhat terrifying we'd recommend it it's it's a good one so I'm speaking with multiple security experts again we have it on good authority that we've proposed vulnerabilities are potentially legitimate no one would commit to it firmly but discussion generally did indicate that these are possibly legitimate concerns on the am the architecture now some of them made the leap to say you know what if this is a concern on A&E it's also a concern on Intel because once someone has your username password and can flash bios you're kind of screwed anyway so it's possible this is actually a problem our present understanding is that these vulnerabilities are one not unique to AMD necessarily and two may require root access to the host system if everything we've read in the white papers is as we perceived it to mean and three they're blown way out of proportion if they are legitimate so we have something where there are potentially legitimate concerns but the supposed impact of those concerns has been painted in a way that makes them look much worse than reality if they are in fact a concern the viceroy is the most peculiar element in all this that paper really really made them to look like crazy people so and I mean genuinely like if we try to remain neutral through this whole thing that's the one place I can point and say what the hell are they hot you should you seriously should look at parts of it because it's insane so that's it for this one long story short if you are worried about this don't be maybe there's a problem don't give people you don't trust Ruta access to your computer and access to bios you'll probably be fine just a quick note on Intel before closing out we've seen some conspiracy theories online revolving around Intel largely alleging involvement or suggesting and of Intel and all of this we messaged Intel and requested a statement and any insight to this matter Intel replied with an official on record statement and said quote Intel had no involvement in the CTS labs security advisory so that's what we've got from them so subscribe for more content like this as always go to store that gamers Nexus dotnet tobacco order one of our mod mats the anti-static mod mats are coming back in in the next few weeks and shipping out immediately and go to patreon.com/scishow to thanks for watching I'll see you all next time
We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.