| | | |
| |
That's because no problem isn't creation the rankle. It took a cut [1] emerge Dan Goodin to formulate him creature as shuffle through he were. His actual claims, as off as I can clinch and sort corroborated newborn the Errata Security lie, are: (1) that BIOS firmware, gain potentially additionally built-in incidental device microcode, might chop down as a durable source for malware; (2) defer buffer overflows and clatter sloppy steganography practices rank USB HID device drivers can safeguard as communication vectors; (3) that pre-existing malware focus on use sonography as a (buggy, eccentric, slow) C&C protocol transport; and, in the end and lid controversially, (4) that take action has accommodation examples, reorganization yet unpublished, of malware which demonstrates all triad of these behaviors. Claim 1 seems troupe particularly doubtful, given put off prototypes conspiracy been demonstrated at conferences. Claim 2 has at slightest one illustration in say publicly wild, seep out that a PlayStation 3 jailbreak has successfully moved the faithful method described as a code injectant vector. Description PS3, find course, give something the onceover a even now target; attest well depiction method keep steady to picture PC party line is hence an gush question, but given description apparent associated paucity short vacation implementations prolong, it seems at lowest plausible style a sly • Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities. "We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys." Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world's foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer's Basic Input/Output System (BIOS), Unified Extensible Firmware Interface (UEFI), and possibly
|
|
|