Header Ads

Did you know, CPU can be hacked from your entire computer?-MonHax

CPU hack
What is CPU hack?
If you say that you have a special chip attached to your computer-which has the power to control all the hardware on your computer and can be accessed remotely and there is no way to discharge it. What is weird to hear? Although strange, the matter is completely true and horrible. Today's article will discuss topics that you have never heard before. Its impossible to discuss in few word. So continue please.

Processor Risk?
Today most Intel and AMD processors are used as computers. If you are using an Intel processor computer, you must have seen the name of the intel management engine or the driver installed. Again you will hear the name of the platform security processor if you are an AMD user. But you know that over the past 10 years, as many computers have been created, these two types of chips have been installed on computers powered by Intel and AMD processors - and these chips work as backups of all computers. Although Intel and AMD pledge that they use this backdoor only for their legitimate purposes, then there are some reasons why it is permissible for you to worry.

Intel management engine?
So what is the main thing in Intel Management Engine? It can basically say a different and collaborative processor chip, which is physically sticky with Intel chipsets. Simply put, Intel Management Engine can tell you another computer in your original computer. But the worst thing is that we almost do not know what it used to be. It basically works on Intel-owned code and never releases Intel's source code. However, there are valid features in it that Intel uses to improve their service standards. Let's know from the list below what this hardware can do;

  • It can take control of your RAM directly and use RAM, and the main CPU does not support the use of RAM.
  • It can take control of all the devices connected to your computer; Mouse, keyboard, hard drive, external drive, webcam etc can operate everything
  • It has the ability to send or receive any network traffic easily connected to your computer's network interface, and it can also be able to bypass the internet firewall comfortably.
  • Moreover, it has the ability to bypass the entire operating system of the computer, even if there is no operating system on the computer, it has the ability to operate the computer
  • This processor has the capability to remote control your computer on or off even after having so much power, that means it can do a lot while your computer is off.


Looking at the features of this chip, surely he is thinking, "Hey, Fazlulu? Why this chip has access to so many things or for this chip company? Again, I can not even deploy these features on them! "The main purpose of chiping this chip with your computer is to remotely update or repair your computer. You know very well, how many customers have a Giant company like Intel, now Intel will surely not go home everybody to support this million customer support, is not it? So they have already set up such systems so that they can update and repair bulk systems all at once.

Now maybe say, "OK, good features and many users will benefit from this, but this is my personal computer and I do not need these things, so Intel now tell me how do I disguise it?" And here is the bad news for you, Management Engine can not disrupt the operation of the chip and will not be able to buy any Intel processor in the market, where the chip is not installed beforehand. Even if you think of using an AMD processor instead of Intel, it can not be skipped. Prior to this, Kenona has mentioned that the AMD processor also has this type of chip installed, named as Platform Security Processor or PSP. And like the Intel management engine it also has the power to manage everything on your computer and we have no idea that it works on any code.

Cellphone?

"Well, brother, I got it! My computer has a secret backdoor and I can not even dispose it, but my cellphone is safe from this matter? Korna Cellphone does not have Intel or AMD processor installed! So at least safe from this point, right? " Have you ever heard of Kibesbad processor? Of course not, but this processor is installed on every cellphone, it mainly converts the radio signals and digital signals from the phone's antenna. Of course, there is a need for this chip to work properly on your phone, and of course yes, this chip has low level access to control all the data on your phone. Another good thing to know, Intel's management engine and AMD's platform, such as security processor, is owned by Codio of baseband processors. This means that the manufacturer that made your phone, has installed this processor with its own code, which can not be accessed by anyone, but the processor has the power to access everything on its own.

Points?

"I understand everything, what is the point of discussion for the bat? Intel and AMD will not hack our PC, is not it? Again the code has huge encryption, then what is the result of this discussion? "-Hey brother, of course Intel or AMD will not monitor or hack your computer using this secret backdoor. But here only Intel or AMD is not the reason of fear. It is a matter of fear that if a hacker group cracks, or if a government tries to access it then it can definitely be horrific. Yes, this chip has a lot of hard disk encryption installed, but I have already said no encryption will make you 100% secure. It is not difficult to crack, but it can not be cracked. It is possible that a hacker will find some vulnerabilities in the chip with this chip, and if it is possible, then it will control almost any computer on the world. Which can run in Intel or AMD processors. And since this chip works bypassing the main processor of the computer, it is almost impossible to save your PC from a hack attack, but it is completely impossible. Since this chip can work directly connected to the PC's network interface and can receive traffic receipts and send, hackers can easily inject any malware onto your computer. If the operating system blocks the operating system by blocking the firewall, then this chip can easily be able to bypass the block. However, this chip and cracking of these chips are difficult, but it is not impossible. We are in the likelihood of an unknown hack attack of 1%. Here's another thing to look at, see the code of this chip, but owned, if the open source code would have been read, everyone could read the code and if there was any error, then maybe a good IT expert could tell the specialist, before the hacker's redacting of the blackhat. But since no one knows its code and it is a closed code so before finding the person's error, bad person will try to find errors before, and if he succeeds in success, he will surely not share the company.

Last word?
Although the probability of hacking is small, it can be estimated that such a hack attack can happen. If the processor gets hacked, what can we do? nothing! I can not do anything at all. It does not matter what operating system you are using or how strong password you are using. In fact, many strong passwords can not provide you security at all times. Suppose you have set a 50-character password, but if someone asks you for a password on your head, give it a try! Then it was today's article.


No comments

Powered by Blogger.