Key Takeaways
1. A serious flaw in the Initial RAM Filesystem (initramfs) can lead to evil maid attacks on encrypted Linux laptops, despite using Secure Boot and password-secured bootloaders.
2. Attackers can exploit the vulnerability by entering incorrect disk decryption passwords, accessing a low-level debug shell, and injecting malicious scripts.
3. The initramfs is not cryptographically signed, allowing hackers to modify it without triggering security alerts.
4. This vulnerability highlights a design flaw prioritizing system recoverability over security, often overlooked in hardening manuals and evaluations.
5. Users can enhance security by changing kernel settings to prevent the launch of a debug shell after failed password attempts.
Cybersecurity experts have uncovered a serious flaw that threatens the safety of many encrypted Linux laptops, opening the door to evil maid attacks. A new report from Ernw reveals that even when systems use established protections like Secure Boot and password-secured bootloaders, a major lapse in security can lead to total system takeover.
The Attack Method
The vulnerability is found in the Initial RAM Filesystem (initramfs), which is a temporary setup used during the boot process to get the main operating system ready. By deliberately entering the wrong disk decryption password multiple times, an attacker can push the system into a potent, low-level debug shell.
Exploiting the Weakness
From within this shell, the essence of the vulnerability can be taken advantage of. Since the initramfs isn’t cryptographically signed — only the kernel and its modules are — a hacker can extract it, add harmful scripts, and repackage it without triggering any security alerts. When the laptop is next booted and the user types in their password correctly, the concealed malware activates with the highest privileges, which allows it to steal the decryption key, record keystrokes, or send out data.
The researchers emphasize that this issue is more a flaw in design prioritizing system recoverability than a simple bug related to physical security. Importantly, this attack method is frequently overlooked in typical hardening manuals and security evaluations.
Simple Solutions
Luckily, addressing the issue is quite easy. Users and system admins who are concerned can change their system’s kernel settings to make sure the computer stops or restarts instead of launching a debug shell after failed password entries. The findings serve as a clear warning that even strong security measures can be compromised by one weak point.
Source:
Link