March 25, 2015 By Shane Schick 2 min read

As security threats go, the LightEater malware contains some of the worst possible elements. It’s easy enough to be used by everyday people, exploits a vulnerability common in the majority of computer systems and can have an effect in about two minutes.

At the CanSecWest security conference taking place in Vancouver, Canada, this week, researchers Xeno Kovah and Corey Kallenberg presented research showing how they discovered basic holes in BIOS chips. This allowed them to infect machines with the LightEater malware, a bootkit that could hit many systems at the same time and gain high levels of access to steal passwords or other data. Wired noted the malicious code could persist even on PCs that were wiped and given a new operating system.

It is important to note here that the LightEater malware is a proof of concept that hasn’t actually been used for criminal purposes. However, in an interview with Threatpost, the researchers said the vulnerability stems from the open-source code within the BIOS of most computers and could allow third parties to hack into the System Management Mode and take over various hardware controls.

In this case, compromising systems via the BIOS would require the attackers to already have remote access to a machine. However, BetaNews observed that similar vulnerabilities have already been exploited by the U.S. National Security Agency. The difference here is that the LightEater malware takes advantage of flaws that are widespread and relatively simple to find.

In theory, the threat disclosed in the CanSecWest presentation could affect anyone, from home users to businesses and governments. However, FierceCIO suggested a great deal of the risk could be mitigated if IT departments simply become more proactive about applying patches and updates to the BIOS. That seems to be the overall message the researchers are trying to convey, too.

A final but critical point was made by SC Magazine, which posited that something like the LightEater malware might be better described as an advanced persistent threat, potentially making it an even higher priority for those aiming to better protect their data from cybercriminal activity. After all, a BIOS is not only central to nearly all hardware, but even a hypothetical illustration of an attack should be taken as seriously as the real thing.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today