Security researcher says new malware can affect your BIOS

Page 1 of 2 12 LastLast

    Security researcher says new malware can affect your BIOS


    Posted: 08 Nov 2013
    Security researcher says new malware can affect your BIOS; communicate over the air

    A noted security researcher says he has found a new type of malware that can affect some of the lowest levels of your machine.

    No, I’m not talking about Wi-Fi downloads, but input signals converted into code by your laptop’s microphone. The new malware is dubbed badBIOS by Dragos Ruiu, the security researcher who says he uncovered it.

    Ruiu recently told Ars Technica that he’s been tracking down badBIOS for the past three years. Since badBIOS is reportedly a crafty piece of code, all he has right now is a working theory about how the malware works.

    Malware that starts by attacking the BIOSisn’t unheard of, but most bits of bad code typically attack weaknesses in standard targets that live inside the operating system, such as Adobe Reader or a Java browser plugin.

    BIOS malware could be more effective since it’s harder to track down, and fixing it is beyond the capabilities of the majority of PC users.

    But what really sets badBIOS apart is that it is supposedly capable of resisting erasure if someone reinstalls (known as flashing) the BIOS firmware. BadBIOS is also platform-independent, which means it can infect and work across a wide array of PC operating systems that include Windows, OS X, Linux, and BSD, according to Ruiu.

    Updated 11/1/2013 at 5:15 p.m. PDT—This story was updated to reflect that the current theory says badBIOS malware communicates over high-frequency signals, but infections happen only via USB sticks.
    Security researcher says new malware can affect your BIOS; communicate over the air | PCWorld
    Borg 386's Avatar Posted By: Borg 386
    08 Nov 2013



  1. Posts : 7
    Windows 7 Enterprise x64
       #1

    Very interesting method of infection. Thanks for the post.
      My Computer


  2. mjf
    Posts : 5,969
    Windows 7x64 Home Premium SP1
       #2

    I would think infection of the MBR boot code could be more risky. I'm not sure which anti malware software (if any) checks this.
      My Computer


  3. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #3

    This is complete bogus crap. Sound hardware has nothing to do with BIOS nor the CPU, every motherboard uses a completely different sound system and chip.

    Thirdly you would notice right away if something tried to modify the BIOS, in windows you need special privileges and UAC approval not to mention the manufacturer's own tools to modify those parts of the lower hardware level and on linux/BSD you need to be root and have the supporting software installed, not to mention that every BIOS is different. If you flashed a random BIOS to a random motherboard, it would not boot.

    Here's why this is nonsense:
    http://www.rootwyrm.com/2013/11/the-...ysis-is-wrong/
      My Computer


  4. mjf
    Posts : 5,969
    Windows 7x64 Home Premium SP1
       #4

    BIOS modification would probably need to be done at the source of your PC. However, the BIOS in an MBR boot hands over to MBR boot code before the OS kicks in and this lives on your HDD/SSD. One inserted (assembly) jump command could spell disaster IMO. Hence my question does the likes of Malwarebytes check your MBR boot code?
      My Computer

  5.    #5

    Isn't the jmp Assembly instruction like the continue keyword in C/C++? A attacker could easily use the jmp instruction to bypass straight to their malicious code.
      My Computer


  6. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #6

    Anti-Rootkit Scan?


    mjf said:
    BIOS modification would probably need to be done at the source of your PC. However, the BIOS in an MBR boot hands over to MBR boot code before the OS kicks in and this lives on your HDD/SSD. One inserted (assembly) jump command could spell disaster IMO. Hence my question does the likes of Malwarebytes check your MBR boot code?
    Shouldn't the anti-Rootkit scan check that?
      My Computer


  7. Posts : 568
    Windows 7 64-bit, Windows 8.1 64-bit, OSX El Capitan, Windows 10 (VMware)
       #7

    yowanvista said:
    This is complete bogus crap. Sound hardware has nothing to do with BIOS nor the CPU, every motherboard uses a completely different sound system and chip.

    Thirdly you would notice right away if something tried to modify the BIOS, in windows you need special privileges and UAC approval not to mention the manufacturer's own tools to modify those parts of the lower hardware level and on linux/BSD you need to be root and have the supporting software installed, not to mention that every BIOS is different. If you flashed a random BIOS to a random motherboard, it would not boot.

    Here's why this is nonsense:
    The badBIOS Analysis Is Wrong. at RootWyrm's Corner
    Thanks for the link that debunks the badBIOS, quote from your link:
    So what do I think? I think that A) a number of security experts flapping their gums are good at security and know nothing about how hardware works and B) it’s absolutely not a BIOS/Firmware level piece of malware. There are far, far too many blatant and obvious detection points. There is no way it could hop from Apple to PC, or even PC to PC or Macbook 2013 to Macbook 2011. (Forget Macbook to Mac Pro.)
      My Computer


  8. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #8

    Skip UAC


    As far as I'm concerned, it is a bad idea to be able to update the BIOS from inside the OS.

    It is possible to bypass/disable the UAC warning on operations.
    CCleaner does it.
    Security researcher says new malware can affect your BIOS-uac-ccleaner-skip.png
      My Computer


  9. Posts : 53,365
    Windows 10 Home x64
       #9

    mjf said:
    BIOS modification would probably need to be done at the source of your PC. However, the BIOS in an MBR boot hands over to MBR boot code before the OS kicks in and this lives on your HDD/SSD. One inserted (assembly) jump command could spell disaster IMO. Hence my question does the likes of Malwarebytes check your MBR boot code?
    The regular Malwarebytes does not, but the Malwarebytes Anti Rootkit (MBAR) does

    Meet Malwarebytes Anti-Rootkit | Malwarebytes Unpacked

    The Avast aswMBR might be something to look at

    aswMBR

    Or the GMER MBR rootkit detector

    mbr.exe

    To be sure, I believe you'd have to scan with a bootable CD, outside of windows.

    A Guy
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 01:27.
Find Us