TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

"BadBIOS" features explained

90 pointsby q_noover 11 years ago

15 comments

fiatmoneyover 11 years ago
There are polite and impolite ways to express skepticism, and I&#x27;d encourage anyone to give Ruiu the benefit of the doubt as far as his motivations are concerned, even if you can think of an uncharitable explanation. &quot;Here&#x27;s some odd behavior I&#x27;ve seen and a possible explanation&quot; is far from a hostile or irresponsible thing to say, especially when there are long histories of state-level and non-state level bad actors engaging in behavior to warp the target&#x27;s perception relative to observers&#x27; of what&#x27;s going on. [1][2]<p>[1] <a href="http://en.wikipedia.org/wiki/Stasi#Zersetzung" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Stasi#Zersetzung</a><p>[2] <a href="http://en.wikipedia.org/wiki/Gaslighting" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Gaslighting</a>
评论 #6656168 未加载
评论 #6656805 未加载
bitwizeover 11 years ago
<i>But at the same time, this is Dragos Ruiu, a well-respected researcher for 15 years. If he says he&#x27;s got an infected BIOS, I&#x27;m going to believe him.</i><p>My first impression was that badBIOS was an elaborate troll on the part of Ruiu, to make the point that just taking what even a &quot;well-respected researcher&quot; says at face value is NOT good security practice.
评论 #6655448 未加载
评论 #6655013 未加载
评论 #6654970 未加载
评论 #6655086 未加载
评论 #6655106 未加载
sillysaurus2over 11 years ago
Would someone please explain how the firmware dumps of the infected computer are being made?<p>Is it true that if you control the firmware, then you control what the dumps of that firmware will look like? The only way I can imagine getting a clean dump of that machine is by desoldering the chips and imaging them via some specialized tool. If the machine&#x27;s firmware is rooted, how can you trust any signal the machine sends, especially firmware dumps? The virus could trivially hide itself by detecting a firmware dump is in progress and sending a decoy (clean) image.
评论 #6655560 未加载
评论 #6655671 未加载
aryastarkover 11 years ago
The Ars Technica article is nothing short of offensive. It&#x27;s an article that does not need to exist. We need to sit down and have a nice long talk about the ethics of fear mongering in the security industry, as well as the idea that a &quot;well-respected researcher&quot; would not only hype up his findings, but not even <i>reveal</i> his findings until a conference that <i>he</i> organizes. Talk about a conflict of interest.<p>I&#x27;m willing to give Dragos the benefit of the doubt here and just assume that Dan Goodin has his head so far up his ass he can&#x27;t see clearly and that Dragos has no intention of misleading people.<p>But having these issues for 3 years? Let&#x27;s just say that extraordinary evidence needs to come out fairly quickly now. Or at least a massive correction of the hype here. Surely, in 3 years, <i>someone else</i> would have discovered this thing.
websitescenesover 11 years ago
I can&#x27;t believe how presumptuous every one is here. Let&#x27;s just wait and see. The idea is completely plausible. I like to operate off of facts and right now we just don&#x27;t have them.
评论 #6655374 未加载
评论 #6657280 未加载
bashcoderover 11 years ago
I&#x27;m just thankful that China doesn&#x27;t make computer hardware.
评论 #6655994 未加载
评论 #6655113 未加载
ieatdotsover 11 years ago
&gt;With a slightly more expensive dongle that can transmit as well as receive, your laptop can pretend to be a wifi access point or a cell phone tower...<p>I understand the point being explained here, but is this really accurate? I don&#x27;t know of any SDR platform, let alone a &quot;dongle&quot; with anywhere near the capacity necessary to operate as a wifi AP.
评论 #6656182 未加载
评论 #6655654 未加载
评论 #6655575 未加载
e12eover 11 years ago
For a summary of quite a few of the techniques mentioned in the Ars article, have a look at:<p>Hardware backdooring is possible - By Jonathan Brossard <a href="http://www.youtube.com/watch?v=yRpilXPv8pU" rel="nofollow">http:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=yRpilXPv8pU</a><p>(This one more recent from nullcon, made a splash from DefCon 20 earlier).<p>It&#x27;s not really much of a stretch that an agency (commercial, criminal or government) that dedicated a few man-years of work could come up with something along these lines.<p>There&#x27;s really only one-and-a-half &quot;out there&quot; claims: the &quot;half&quot; being networking via audio, the &quot;one&quot; being cross-platform.<p>It&#x27;ll be interesting to see if they manage to grab a dump of the malware and we can get more eyes looking at it...
mateuszbover 11 years ago
I encourage people to learn about ITP port and JTAG debuggers for processors. It is easy to verify all of this with ITP debugger in no time. I am surprised nobody did it. It is amateurish at least for a 15 years of experience. I&#x27;d expect a researcher like that to know about hardware ITP port. How do you think BIOS or UEFI firmware are developed and debugged? The cost of the debugger is 20k USD and you hook directly into the CPU bus and see everything from SMM mode transitions to cache events. Complete transparency without the sci-fi claims anymore and crap publicity.<p>EDIT: <a href="http://en.wikipedia.org/wiki/In-target_probe" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;In-target_probe</a>
greglindahlover 11 years ago
A mild omission in the blog posting: the BIOS continues to run after the OS boots. See: <a href="http://en.wikipedia.org/wiki/System_Management_Mode" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;System_Management_Mode</a>
评论 #6657259 未加载
stephengillieover 11 years ago
How would you write an OS that would be encrypted or otherwise inaccessible to the hardware on which it&#x27;s running? It would be a kind of hypervisor OS, but you might run only 1 VM so you could connect via console and maximize resources, as though it were a standard PC. Or maybe have a small server VM to help your network manage resources.<p>Are we looking at a future where a standard OS install is a multi-VM situation?
评论 #6658501 未加载
habermanover 11 years ago
How could malware jump across an air gap to a clean machine, even theoretically? No uninfected machine would reflash its firmware from what it was hearing on its speaker.
评论 #6656415 未加载
Lagged2Deathover 11 years ago
I am reminded of N rays.<p><a href="http://en.wikipedia.org/wiki/N-rays" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;N-rays</a>
AsymetricComover 11 years ago
#1 feature: being able to sway large portions of IT-sector opinion, with unsubstantiated fear and security threats, to be pro-internet regulation.
评论 #6658523 未加载
fantnnover 11 years ago
Guess I&#x27;ll be adding a frequency emitter in this range near my air gapped machine.
评论 #6656452 未加载