ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Firmware attacks significant threat in age of hybrid work

By Shannon Williams
Thu 30 Jun 2022

Changing workforce dynamics are creating new challenges for IT teams around firmware security, according to new research released by HP from HP Wolf Security.

According to the research, as business workforces become increasingly distributed, IT leaders say its harder than ever to defend against firmware attacks.

The shift to hybrid work models has transformed how organisations manage endpoint security, while also highlighting new challenges for IT teams around securing device firmware. 

The HP Wolf Security global survey of 1,100 IT leaders reveals that:

The threat of firmware attacks is a growing concern for IT leaders now that hybrid workers are connecting from home networks more frequently
With hybrid or remote work now the norm for many employees there is a greater risk of working on potentially unsecure home networks meaning that the level of threat posed by firmware attacks has risen. More than eight-in-ten (83%) IT leaders say firmware attacks against laptops and PCs now pose a significant threat, while 76% of ITDMs said firmware attacks against printers pose a significant threat.

Managing firmware security is becoming harder and taking longer in the era of hybrid work, leaving organisations exposed
More than two-thirds (67%) of IT leaders say protecting against, detecting, and recovering from firmware attacks has become more difficult and time-consuming due to the increase in home working, with 64% saying the same of analysing the security of firmware configuration. As a result, 80% of IT leaders are worried about their capacity to respond to endpoint firmware attacks.

"Firmware attacks are very disruptive and much harder to detect or remediate than your typical malware often requiring expert and even manual intervention to fix," says Dr. Ian Pratt, global head of security for personal systems at HP Inc. 

"This increases the cost and complexity of remediation considerably, particularly in hybrid environments where devices are not on site for IT teams to access," he says. 

"Having more endpoints sitting outside of the protection of the corporate network also reduces visibility and increases exposure to attacks coming in via unsecured networks.

"At the same time, we are seeing a rise in destructive attacks such as wiper malware," says Pratt. 

"Last year, our research team saw attackers conducting reconnaissance on firmware configurations, with the likely intent of exploiting unsecured configurations to weaponise for financial gain. 

"Once an attacker has gained control over the firmware configuration, they can exploit their position to gain persistence and hide from anti-malware solutions that live in the Operating System," he says.

"This gives them an advantage, allowing them to stealthily maintain persistence on target devices, so they can gain access to infrastructure across the enterprise and maximise their impact."

Despite the clear risks that firmware attacks pose to organisations, device security is not always a major consideration in the hardware procurement process, with many organisations continuing to use technologies that are not built with security in mind. 

This issue is being exacerbated by the new shadow IT whereby employees are purchasing and connecting devices outside of IT purview while working remotely. HP Wolf Security's Out of Mind and Out of Sight report found that 68% of office workers that purchased devices to support remote work said security wasn't a major consideration in their purchasing decision. Furthermore, 43% didn't have their new laptop or PC checked or installed by IT or security.

Boris Balacheff, chief technologist for security research and innovation at HP Labs, says security must become part of the procurement process when purchasing new IT devices. 

"Organisations need to play the long game, because the devices you procure today will be the environment you have to manage and protect tomorrow," he says. 

"State-of-the-art device security delivers protection for firmware against malware as well as physical tampering, with detection both below and above the OS and autonomous self-healing recovery from the hardware up but this will only help address the issue for organisations that know to ask the right questions when they procure new devices."

HP warns that one of the key issues that businesses face is that many organisations are still reliant on legacy devices that were built to older industry standards, where design for manageable security and resilience at scale was not a focus for hardware and firmware design. This is leaving a gap in enterprise security that could take years to close.

Balacheff says, "As attackers continue to invest in the capability to attack and disrupt PCs and other OT and IoT devices at the firmware level, organisations also need to learn how to monitor the state of the art in device security to keep updating procurement security requirements accordingly. 

"This is what will enable leading organisations to stay ahead of emerging threats and protect, detect and remediate firmware attacks at scale in the era of hybrid work."

Related stories
Top stories
Story image
Smartphone
Hands-on review: Samsung Galaxy Z Fold 4 smartphone
With its new range of foldable phones, Samsung has definitely brought a vibrant new energy to the smartphone market.
Story image
Cryptocurrency
Crypto crime: Illicit activity falls with rest of market
Cryptocurrency scams, which typically present themselves as passive crypto investing opportunities, are less enticing to potential victims.
Story image
SaaS
Cloudera launches all-in-one data lakehouse cloud service
CDP One makes it faster, easier and less risky for businesses to move to the cloud and migrate existing workloads to a modern data architecture.
Story image
Environment
Lenovo launches CO2 Offset Service for SMBs across A/NZ
Lenovo has announced the rollout of a new, first-of-its-kind CO2 Offset Service for SMBs across Australia and New Zealand. 
Story image
Consulting
SAS awards Zencos as the 2022 A/NZ Partner of the Year
SAS has recognised US-based financial crimes and data consulting firm Zencos with the 2022 Australia and New Zealand Partner of the Year award.
Story image
Customer
ValueFlow and FLI announce capital alliance for enhanced channel outcomes
ValueFlow and Founder Led Investments (FLI) have announced that they have entered into a capital alliance, which looks to expand ValueFlows business in Australia and Asia Pacific.
Story image
Techday
10 misconceptions about Techday and how it operates
Even with 17 years in the tech news space, Techday still finds that there are a range of things people misunderstand about how we operate.
Story image
Cloud
Microsoft announces Pax8 as indirect CSP distributor in A/NZ
Microsoft has recently announced Pax8 as a Cloud Solution Provider (CSP) indirect distributor in the A/NZ region.
Story image
Review
Hands-on review: JBL Flip 6 portable speaker
Once you switch it on, and listen away for up to 12 hours, you will quickly realise that this is a little speaker looking for a party.
Story image
Cybersecurity
Education sector seeing highest volumes of cyber attacks
When breaking down the numbers to education attacks by region in July 2022, A/NZ was the most heavily attacked.
Story image
Cybersecurity
CISOs need to consider a risk-based cybersecurity strategy
Rather than talking in terms of attack vectors and vulnerabilities, CISOs and security decision-makers must look at actual business risk.
Story image
Arlo
Hands-on review: Arlo Go 2 security camera
In my humble opinion, Arlo Go 2 offers security for anyone needing to keep a remote eye on prized possessions or premises at different locations.
Story image
Gartner
Fortinet attributes Gartner-reported growth to ZTNA approach
Zero-trust is slowly becoming a dominant enterprise security strategy for businesses, and the Gartner report highlights that although prominent, it is often underutilised.
Story image
Microsoft
8x more users attacked via old Microsoft Office vulnerability in Q2
"Criminals craft malicious documents and convince their victims to open them through social engineering techniques."
Story image
Marmalade
Exclusive: Marmalade empowers businesses to take control of their cash flow
Marmalade has been making waves in the invoicing space across Australia with its world-first invoice payments platform.
Story image
Retail
AU retailers rate their states for doing business
Retailers are optimistic about economic conditions and potential for business success in their own states, despite the current economic climate. 
Story image
Cybersecurity
Australian IT security concerns higher than before pandemic
Australian organisations are more concerned about cyberattacks than they were prior to the COVID-19 pandemic, according to a new survey.
Story image
Home Entertainment
Hands-on review: TCL 65″ C835 Mini LED 4K Google TV
We introduce you today to a TV that brings the height of immersion to your viewing experience: The TCL 65″ C835 Mini LED 4K Google TV.
Story image
Smartphone
Samsung introduces new generation of foldable smartphones
Samsung has unveiled its new range of Galaxy Z smartphones, bringing new developments to the company’s foldable smartphone portfolio.
Story image
Home security
Hands-on review: Eufy Wire-Free Dual Cam Video Doorbell 2K
We have had our house secured by Eufy products for over seven months now. We love the brand, and it has never let us down.
Story image
Cybersecurity
Claroty research unveils new attack that targets PLCs
Claroty has released research detailing a new type of cyber-attack, one that weaponises programmable logic controllers (PLCs).
Story image
Data breach
Weak breach data disclosure laws for IP theft leaves vital Australian industries vulnerable
Infoblox has seen unprecedented levels of demand for cyber protection from companies outside of the Critical Infrastructure Act who have discovered security events and those who fear falling victim to IP theft.
Story image
Cyber attacks
Dramatic uptick in threat activity with exploits growing nearly 150%
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
Story image
Tech job moves
Tech job moves - Fastly, INX, Kinly, SmartBear & Vectra AI
We round up all job appointments from July 29 - August 12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Samsung
New range of Samsung Smart Watches announced with health focus
Samsung has announced new additions to its SmartWatch portfolio, with the Galaxy Watch5 and Galaxy Watch5 Pro to be released in late August.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Cloud Security
Lookout named Strong Performer in 2022 Gartner Peer Insights
Gartner has recognised Lookout as a Strong Performer in the 2022 Gartner Peer Insights Voice of the Customer for Security Service Edge (SSE).
Story image
ExtraHop
Organisations exposing highly sensitive protocols to public internet
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.
Story image
Communication
Motorola acquires radio comms provider Barrett Communications
Motorola Solutions says the two companies are united in delivering vital communications that organisations worldwide depend on.
Story image
Collaboration
Hybrid working success relies on the return to office
A reluctance to return to the office is impacting a would-be hybrid working model, instead leaving businesses with a mostly-remote workforce.
Story image
Digital Transformation
Common challenges in the evolving digital world, and how to overcome them
Five technology challenges that will help highlight potential pain points and suggest how to circumvent or overcome them on the path to a smooth digital transformation.
Story image
Smartphone
Hands-on review: OPPO Find X5 smartphone
With the release of the new OPPO Find X5 in March, we got the opportunity to explore another one of their premium devices.
Story image
Facial recognition
Benefits vs risks of facial recognition technology
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions. 
Story image
SmartWatch
Hands-on review: Huawei Watch D smart watch
The Huawei Watch D is the latest flagship smart watch from the Chinese tech giant, and it's further proof that the company is more than capable of competing with the likes of Samsung and Apple in the highly competitive wearable market.
Story image
Machine learning
Sysdig releases CDR offering to combat cryptojacking
Sysdig has unveiled a cloud detection and response (CDR) offering powered by machine learning to combat cryptojacking.
Story image
Data Protection
Zero Trust, but verify - finding the OT in ZerO Trust
The move to remote and cloud-based technologies has shifted the goalposts for cybersecurity. It now needs to cover multiple people, devices, platforms, and networks.
Story image
Cybersecurity
Study looks at gender dimensions of AU security sector
A new study will explore solutions to overcome pressing skills and diversity challenges in the Australian security sector.
Story image
Schneider Electric
Schneider Electric launches SM AirSeT in Australia
The new medium-voltage switchgear uses pure air and vacuum interruption, completely avoiding SF6 greenhouse gas.
Story image
IDC
Collaboration app market revenue grows 28.4% year-over-year
IDC has found that global revenues in the collaboration applications market grew 28.4% year-over-year in 2021 to $29.1 billion.
Story image
Network Management
Superloop helping Aussie K12 schools with latest offering
Superloop has launched CyberEdge, a new cybersecurity platform that will give K12 schools in Australia the tools to optimise, secure and manage their network.
Story image
Cloud
Whispir reports significant revenue growth as CaaS market expands
Australian cloud platform Whispir has announced its financial results, reporting significant growth as it continues to introduce new Communications-as-a Service (CaaS) offerings to the market.
Story image
Unified Communications
Gold Coast private hospital improves comms with Alcatel-Lucent Enterprise solutions
With further demands placed on health workers as a result of the pandemic, they need efficient and adaptable solutions that help them effectively serve their communities.