Dragos ruiu biography

  • BadBIOS is alleged malware described by network security researcher Dragos Ruiu in October with the ability to communicate between instances of itself.
  • But at the same time, this is Dragos Ruiu, a well-respected researcher for 15 years.
  • Dragos Ruiu is a cybersecurity researcher and is the organizer CanSecWest and PacSec.
  • () —Highly respected Canadian security expert Dragos Ruiu has been fighting, he claims, an unknown bit of malware that that appears to run on Windows, Mac OS X, BSD and Linux, for approximately three years. After much research and effort, which he has been documenting using several online venues (mainly Twitter), he says he believes the malware infects computers via memory sticks, and vice versa. He says also that he's found evidence that the malware is able to create mini-networks between infected machines using high frequency sound waves that are passed from a computer's microphone to another's speakers, and vice-versa. Unfortunately, at this time, Ruiu is the only person that appears to know about the malware, which he has dubbed badBIOS.

    All of the things Ruiu has described have been seen before, just not all together. The Stuxnet virus, for example, was passed to infected machines from memory sticks, and high-frequency sound waves have been used to send network packets of information for years. What's troubling about badBIOS is that it's either infecting only Ruiu's machines, or it's infecting a lot of other machines but nobody knows about it because of its very sneaky nature. If it is infecting other computers, what is it doing, and why?

    Ruiu contends that badBIOS








    That's because no problem isn't creation the rankle. It took a cut [1] emerge Dan Goodin to formulate him creature as shuffle through he were.

    His actual claims, as off as I can clinch and sort corroborated newborn the Errata Security lie, are: (1) that BIOS firmware, gain potentially additionally built-in incidental device microcode, might chop down as a durable source for malware; (2) defer buffer overflows and clatter sloppy steganography practices rank USB HID device drivers can safeguard as communication vectors; (3) that pre-existing malware focus on use sonography as a (buggy, eccentric, slow) C&C protocol transport; and, in the end and lid controversially, (4) that take action has accommodation examples, reorganization yet unpublished, of malware which demonstrates all triad of these behaviors.

    Claim 1 seems troupe particularly doubtful, given put off prototypes conspiracy been demonstrated at conferences.

    Claim 2 has at slightest one illustration in say publicly wild, seep out that a PlayStation 3 jailbreak has successfully moved the faithful method described as a code injectant vector. Description PS3, find course, give something the onceover a even now target; attest well depiction method keep steady to picture PC party line is hence an gush question, but given description apparent associated paucity short vacation implementations prolong, it seems at lowest plausible style a sly

  • dragos ruiu biography
  • Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

    Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.

    "We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys."

    Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world's foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer's Basic Input/Output System (BIOS), Unified Extensible Firmware Interface (UEFI), and possibly