BIOS based rootkits coming soon….



There have been a couple stories out of the “Blackhat federal” conference in the last couple days. Brian Krebs at the Security Fix gives a good overview. One of the more troubling notes is the possibility of creating a rootkit that can hide itself in a systems BIOS. Security Focus has some detail on this as well.


This kind of reminds me of the “old days” of computer viruses where you NEVER did a scan from within the operating system because boot sector viruses, or other infected startup files could hide themselves from a running virus scan. I guess the simplest way to put the problem is this…. ACPI is a function that most BIOS’ these days support. It supports a higher level programming language and if the ACPI BIOS is left writable, then someone COULD hide a “bootstrap” for a rootkit in the BIOS.

This “bootstrap” would then be able to download and install other, larger components later to disc. What’s disturbing about this is that the rootkit itself would survive a drive reformat, or even drive replacement. It would still lay in wait in the BIOS when running an alternative operating system or boot cd. It’s unlikely (they say) that we might have an easily transmittable rootkit that does this, but would most likely be done as “an inside job” where someone with physical access to the machine is able to load this. It’s not reassuring though. Admittedly “pysicall access” to the machine is usually game over in a security context, because really and truly if someone has physical access they can do whatever they please with the box.

Related Posts

Blog Traffic Exchange Related Posts
  • Sony's DRM song sounding worse by the day Well, let's see.... I didn't cover the original story since I was covered up with other work, but let me take a stab at starting from the beginning before I tell you how it's gotten worse. It seems that SONY is concerned about piracy and computers being the tools of......
  • Microsoft releases official VML patch!! The big news this afternoon is that Microsoft HAS gone out of the routine patch cycle to release a security fix for the VML vulnerability that's been actively exploited in recent days for everything from sneak keylogger installs to massive spyware installs. Sans has a few links, if you de-registered......
  • How to Remove AntiSpyware Shield Pro | AntiSpyware Shield Pro Removal AntiSpyware Shield Pro is a rogue antivirus that typically is installed via trojans or other malware. Once it's invited itself onto the system it will do all sorts of things. It will popup warnings about the computers security. It will scan the computer for viruses and find many files that......
Blog Traffic Exchange Related Websites
  • 10 Secret Places For Storing Your Gold You might have some places around the house where you keep some extra cash "just in case," but these places may not work equally well for storing and hiding your gold.  Besides, there may be good reasons for not storing your gold in just the same place you store your......
  • TSA Scans and Pat-Downs (and Personal Finance Links) Like many others, I have been outraged by the detail of the new TSA scanners. I found the advanced pat-downs just as outrageous. I understand the need for security, but I believe our right to privacy trumps that. We are slowly losing all our rights to privacy. You use a......
  • WEP vs WPA Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn't help by adding acronym after acronym.  So what do you do?  The answer is fairly simple - secure your network with WPA!! There are lots......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site