DHS admitted that backdoor malware comes embedded in brand-new imported electronics. Yet that security threat has been real for years; a Defense Science Board warned about a tainted supply chain for tech devices and components back in 2005. When a Homeland Security official admitted to the threat of destructive coding being embedded in imported software and hardware, it caused quite a stir. Yet backdoor malware is no more a secret than the fact that nation states and rogue criminals target the U.S. “by hacking into proprietary data and other sensitive information.”During testimony before the House Oversight and Government Reform Committee, Rep. Jason Chaffetz, R-Utah, questioned a top DHS official about software and hardware that is built overseas, is shipped into the U.S. and comes embedded with spyware or other code meant for sabotage. Chaffetz asked Greg Schaffer, Homeland Security’s Assistant Secretary of the Office of Cybersecurity and Communications, about imported devices that pose “security and intellectual property risks.”As you can see in the video below, Chaffetz continued to pushed for a direct answer about embedded malware in foreign components coming into the U.S. until, after a long pause, Schaffer said, “I am aware that there have been instances where that has happened.”Then Dr. Desjarlais has questions about cyberwar. But at 1:01:38 in the video, the topic turns back to the threat of imported devices with embedded security risks. Desjarlais asks, “Where are the most significant weaknesses in our IT supply chain?” Schaffer said, “The supply chain issues are increasingly complex because we do have a global economy in which our product and equipment is installed and embedded in foreign product and foreign product is installed and embedded in our product and the need to have appropriate processes to address risk and manage ways of identifying where there might have been a compromise to the system is what we focus on in terms of problematics.”Nextgov reported that U.S.-China Economic and Security Review Commission report from January suggested that “kill switches could be installed in Pentagon systems to power down operations in response to remote commands. The potential for harm is enormous, extending from simple identity theft by criminal enterprises to disrupting networks and defense systems vital to national security.” The commission said the “public discussion of the vulnerabilities of electronics components to malicious tampering has been largely theoretical.” While Rep Chaffetz was correct that few people are aware of hidden malware in consumer tech, embedded malware lurking in consumer tech is not a new development. Since it’s been happening for years and is hardly a national security secret, it’s unclear why Schaffer hesitated so long before answering. There have been many incidents of malware-infected products being shipped to consumers, from hardware, to software, and even tainted peripheral devices. Malware has been sent pre-loaded in products like USBs, microchips, cameras, battery chargers, digital photo frames, webcams, printers, cell phones, motherboards or system boards, and hard drives.Adversaries’ “dirty tricks” alarmed a Defense Science Board [PDF] way back in 2005 when it warned the government against the risk of “trojan horse” circuits threatening the “security and integrity of classified and sensitive circuit design information.” It mentioned China by name and advised we needed “aggressive national antitamper development” as “trust cannot be added to integrated circuits after fabrication; electrical testing and reverse engineering cannot be relied upon to detect undesired alterations in military integrated circuits.”A 2010 Embedded Malware whitepaper [PDF] by KUITY, an advanced analytics company, stated that a “portion of hardware and software are contaminated with malicious computer code” which has been “designed to alter the functionality of the application.” Because “perpetrators of embedded malware have developed incredibly sophisticated attacks,” the “treacherous embedded malware” has successfully “compromised and even outright stolen intellectual property, competitive information, new product development data, M&A plans, financial information, trade secrets, and even national security secrets.”KUITY added, “Unlike a virus, malware buried inside firmware often goes unchecked, or appears to be legitimate code. Detecting this hidden malware requires rigorous testing of each component, a costly and time-consuming process, particularly in large organizations with many hundreds or thousands of hardware and system configurations.”If the most cost-effective security answer is “building it in is much cheaper that bolting it on,” then good deal as the U.S. certainly could use the additional jobs.These talks were related to cybersecurity and accessing the nation’s ability to address the growing cyber threat. There has been talk of the military using force after cyber attacks which would constitute an “act of war.” NextGov reported the Pentagon is supposed to release a cyberspace operations strategy on July 14, but “contrary to some expectations, does not call for militarizing the domain.” Instead, the strategy “gives us the impetus to engage with who we think are the perpetrators of the attack — and holds them accountable. That doesn’t have to be through military means,” stated public policy think tank researcher John Sheldon. Like this? Here’s more posts:What happens if you catch a hacker and must deal with the FBI?Microsoft patent may ruin Skype, may make VoIP spy and pry easy for gov’tFBI Dumpster Diving Brigade Coming Soon to Snoop in a Trashcan Near YouMicrosoft: We’re not vulnerable to DDoS attacks‘Secret Law’ of Patriot Act: Geolocation Tracking & Domestic Spying on Steroids?They ARE Listening: Law Enforcement Wiretapping Jumps 34%FaceNiff Android App Allows the Clueless to Hack Facebook in Seconds Over Wi-FiProject PM Leaks Dirt on Romas/COIN Classified Intelligence Mass SurveillanceFormer FBI Agent Turned ACLU Attorney: Feds Routinely Spy on CitizensDid Harvard Researchers Breach Students’ Privacy?In this digital age, what the heck happened to the Constitution?Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe