7/8/2023 0 Comments Absolute lojack wiki![]() Since LoJack’s dropper agent software is whitelisted by several antivirus vendors, an attacker can use these whitelist settings to initiate some local attacks, such as downloading and installing software from different servers.įigure 5 LoJack persistence mechanism (Absolute Backdoor Revisited, BlackHat 2014)įigure 6 Remote code execution example (Absolute Backdoor Revisited, BlackHat 2014) 3.3 LoJax Rootkit in 2018 3.2 Absolute Backdoor Revisited in 2014Īt BlackHat USA 2014, researchers Vitaliy Kamlyuk (Kaspersky Lab), Sergey Belov (Kaspersky Lab) and Anibal Sacco (Cubica Labs) demonstrated the local and remote use of CompuTrace/LoJack agent software (used for a full version installation of rootkit after activating LoJack or reinstalling Windows). Later, Core Security Technologies demonstrated their researchers’ findings by publicly posting some evidence on its website, such as POCs, videos and utilities. They said that an exploitable security risk was hidden in Computrace/LoJack agent software which is built in the computer BIOS, noting that “this anti-theft agent is a high dangerous form of BIOS-enhanced rootkit that allows an attacker to bypass all chipset or installation restrictions to take full control of the devices.”įigure 4 Deactivate the Rootkit, Black Hat 2009Ībsolute Software rejected security issues involved in the research, and claimed that “installing the Computrace/LoJack module will never weaken the security of BIOS”. Security History of LoJack 3.1 Deactivate the Rootkit in 2009Īt the Black Hat Briefings conferences in 2009, Anibal Sacco and Alfredo Ortega from Core Security Technologies delivered a speech titled “Deactivate the Rootkit: Attacks on BIOS Anti-Theft Technologies”. The following figure is an introduction to services provided by LoJack on Dell’s website.įigure 2 Introduction to LoJack on Dell’s official websiteĭell, as one of Absolute Software’s partners, will preinstall LoJack in the BIOS of its computers and package it as an anti-theft service for customers, making their products more competitive than those of competitors.Īll Dell Smart Selection laptops come standard with 1-year LoJack* Antitheft protection (activation is required).įigure 3 Default option for Computrace in the BIOS of Dell G7 7588 (deactivated) 3. Application of LoJackīy preinstalling LoJack in the BIOS of laptops, Absolute Software’s partners can make sure that the devices, once stolen, can be retrieved through technical and legal means.ĭell, a Fortune 500 company headquartered in Landrock, Texas, USA, is famous for producing, designing and selling home and office computers. With LoJack of Absolute Software, major laptop vendors can effectively improve the recovery probability of stolen laptops and protect consumers’ rights and interests, including personal privacy, data security, and property security. Log in with your own account to file a report about the theft to Absolute Software. ![]() Contact the local law enforcement to file a report about the theft. ![]() If a device installed with LoJack is stolen, It owner can take the following measures to retrieve the device. LoJack for Laptops periodically phones home to Absolute Software’s server to both announce its location and to check to see if the machine has been reported stolen.Īdditionally, LoJack for Laptops provides additional services of an investigations and recovery team who partners with law enforcement agencies around the world to return stolen laptops to their owners.Ĭurrently, LoJack for Laptops has been preinstalled in many BIOS images by most laptop vendors.įigure 1 Vendors that trust and have preinstalled LoJack With these anti-theft features built into the BIOS of a device, this software can continuously trace the stolen computer, as long as the device is connected to the Internet. This software is used to trace stolen laptops, with features including the abilities to remotely lock, delete files from, and locate the stolen laptop on a map. In 2005, Absolute Software released LoJack for Loaptops, also known as Computrace. Its products have set an industry standard for persistent endpoint security and data risk management for computers, laptops, tablets, and smartphones. With a history of 20 years, Absolute Software has been a leading provider for device security, management, and tracking.
0 Comments
Leave a Reply. |