BIOS based rootkits coming soon….



There have been a couple stories out of the “Blackhat federal” conference in the last couple days. Brian Krebs at the Security Fix gives a good overview. One of the more troubling notes is the possibility of creating a rootkit that can hide itself in a systems BIOS. Security Focus has some detail on this as well.


This kind of reminds me of the “old days” of computer viruses where you NEVER did a scan from within the operating system because boot sector viruses, or other infected startup files could hide themselves from a running virus scan. I guess the simplest way to put the problem is this…. ACPI is a function that most BIOS’ these days support. It supports a higher level programming language and if the ACPI BIOS is left writable, then someone COULD hide a “bootstrap” for a rootkit in the BIOS.

This “bootstrap” would then be able to download and install other, larger components later to disc. What’s disturbing about this is that the rootkit itself would survive a drive reformat, or even drive replacement. It would still lay in wait in the BIOS when running an alternative operating system or boot cd. It’s unlikely (they say) that we might have an easily transmittable rootkit that does this, but would most likely be done as “an inside job” where someone with physical access to the machine is able to load this. It’s not reassuring though. Admittedly “pysicall access” to the machine is usually game over in a security context, because really and truly if someone has physical access they can do whatever they please with the box.

Related Posts

Blog Traffic Exchange Related Posts
  • Sony's DRM song sounding worse by the day Well, let's see.... I didn't cover the original story since I was covered up with other work, but let me take a stab at starting from the beginning before I tell you how it's gotten worse. It seems that SONY is concerned about piracy and computers being the tools of......
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Hiding malware may evade antivirus Sans had an interesting malware analysis this morning about a blob that appeared to be ascii text (gibberish) that was retrieved by a piece of malware. It turns out that the ascii text was a cleverly encoded exe file (windows executable or program file.) It took several iterations of their......
Blog Traffic Exchange Related Websites
  • Take Action Tuesday: New Years Resolutions On January 1st of every year, millions of people set new year's resolutions. Some set goals to let a new skill, some vow to lose weight, and some promise to start getting out of credit card debt. Today is December 7th, which leaves 25 days until the the new year. Why......
  • WEP vs WPA Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn't help by adding acronym after acronym.  So what do you do?  The answer is fairly simple - secure your network with WPA!! There are lots......
  • Tennis Ball Machine Advantages If you are looking for ways for you to significantly improve your techniques in tennis, then one of the best things that you can possibly to do is to invest in a tennis machine or tennis ball machine. This is a truly ideal device for anyone that is interested in......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site