HomeCyber BalkansMajor supply chain issue impacts numerous Gigabyte PC models

Major supply chain issue impacts numerous Gigabyte PC models

Published on

spot_img

Hundreds of Gigabyte PCs have been found to be affected by a backdoor, posing supply chain risks, according to researchers for the supply chain security vendor Eclypsium. Identified by the firm’s platform, the researchers discovered “suspected backdoor-like behaviour” in systems manufactured by the PC hardware vendor. The backdoor appears to be an intentional “insecure implementation” of the Gigabyte App Center, which is used to download applications for Gigabyte motherboards. The firm’s analysis found the firmware in Gigabyte systems was dropping and executing a Windows native executable during the system start-up process, which was then downloading and executing additional payloads from Gigabyte servers. Gigabyte has yet to respond to the development at this time.

Eclypsium noted that the implementation is concerning due to the previous exploitation of legitimate “OEM backdoors” by threat actors to conduct campaigns. The supply chain security vendor cited the example of Russian advanced persistent threat group Fancy Bear’s exploitation of Computrace LoJack using a similar flaw. Researchers said they were worried about the backdoor’s potential for use in supply chain attacks, despite the vendor not yet seeing any threat actors exploiting the backdoor. The Eclypsium report also noted that malicious actors could abuse the Gigabyte App Center flaw to commit man-in-the-middle attacks or DNS poisoning to compromise targeted systems.

Additionally, the firmware fails to implement cryptographic digital signature verification or any other secure validation methods, posing further potential cybersecurity risks. While the dropped executable and Gigabyte tools have a Gigabyte cryptographic signature satisfying Microsoft Windows code signing requirements, this does little to offset malicious use, especially if exploited using Living-off-the-Land techniques. As a result, any threat actor can use this to persistently infect vulnerable systems either via Man-in-the-Middle (MITM) or compromised infrastructure.

The supply chain risk is particularly noteworthy due to the increasing tendency of threat actors to employ “living-off-the-land” techniques, whereby legitimate management tools and command-line functions are abused rather than deploying malware. John Loucaides, Senior Vice President of Strategy at Eclypsium, highlighted concern over whether a patch would fully fix the issue, saying the uptake of users installing firmware updates has been “abysmal.” Even in the best-case scenarios, Loucaides does not expect that most devices will get firmware updates to fix it permanently. Thus this backdoor continues to pose a threat for years to come, even with a patch in place.

The Eclypsium researchers stated that they are working with Gigabyte to address and mitigate the insecure implementation of the App Center capability. The researchers’ discovery of the Gigabyte App Center backdoor highlights the ongoing cybersecurity challenge posed by supply chain risks. Far-reaching supply chains can be vulnerable to deliberate or accidental vulnerabilities introduced by third-party suppliers, which in turn can cause a range of potential harms, as noted by the SolarWinds attack in late 2020. As a result, organisations must ensure controls are in place to identify, assess and mitigate risks across their entire supply chain.

Source link

Latest articles

Critical Citrix NetScaler Vulnerability Exploited in Real-World Attacks

Critical Citrix Vulnerability CVE-2026-3055 Under Active Exploitation A severe security vulnerability affecting Citrix’s networking and...

Leak reveals Anthropic’s Mythos, a powerful AI model designed for cybersecurity applications

In recent developments within the cybersecurity sector, uncertainty surrounding the naming of a new...

Attackers Exploit Vulnerabilities in F5 and Citrix Equipment

F5 Revises Severity of Flaw Disclosed Last Year On March 30, 2026, prominent cybersecurity concerns...

LangChain Path Traversal Vulnerability Highlights Input Validation Issues in AI Pipelines

Back to the Basics: Addressing AI Vulnerabilities The realm of artificial intelligence (AI) is not...

More like this

Critical Citrix NetScaler Vulnerability Exploited in Real-World Attacks

Critical Citrix Vulnerability CVE-2026-3055 Under Active Exploitation A severe security vulnerability affecting Citrix’s networking and...

Leak reveals Anthropic’s Mythos, a powerful AI model designed for cybersecurity applications

In recent developments within the cybersecurity sector, uncertainty surrounding the naming of a new...

Attackers Exploit Vulnerabilities in F5 and Citrix Equipment

F5 Revises Severity of Flaw Disclosed Last Year On March 30, 2026, prominent cybersecurity concerns...