Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

New BIOS Exploiting Rootkit Discovered 205

First time accepted submitter mtemar writes with a Symantec analysis of an interesting new trojan/virus. From the article:"There are more and more known viruses that infect the MBR. Symantec Security Response has published a blog to demonstrate this trend last month. However, we seldom confront with one that infects the BIOS. One of them, the notorious CIH, appeared in 1999, which infected the computer BIOS and thus harmed a huge number of computers at that time. Recently, we met a new threat named Trojan.Mebromi that can add malicious components into Award BIOS which allows the threat to take control of the system even before MBR."
This discussion has been archived. No new comments can be posted.

New BIOS Exploiting Rootkit Discovered

Comments Filter:
  • by Baloroth ( 2370816 ) on Wednesday September 14, 2011 @01:09PM (#37400606)

    I really, really like what Gigabyte does with their BIOSes. They quite often have 2 on each motherboard, only one of which can be written to. In case of corruption of the primary, you can always boot using the secondary. Wouldn't stop this virus, of course, but it does prevent a corruption based one from hosing your system. Editing BIOS settings from Windows can be pretty convenient, especially if you want to overclock, but it isn't really necessary and probably shouldn't be possible.

  • by webnut77 ( 1326189 ) on Wednesday September 14, 2011 @01:10PM (#37400622)
    Sounds like you're confusing BIOS with CMOS.
  • by cachimaster ( 127194 ) on Wednesday September 14, 2011 @01:31PM (#37400914)

    Preface: I know a thing or two about BIOS hacking.

    Me too, I did it several times. Not too hard if you have several motherboards to waste :)

    Given the very limited space available in the average PC Flash BIOS chip, how fancy can this possibly be, ?

    Well apparently this was found on the wild, working.

    This doesn't leave a whole lot of space for adding an attack module.

    You don't need very much if you know assembly. 512 bytes (yes, bytes) is enough for a very good win32 shellcode with network access. I have found anything from 1KB to 30 KB free memory, and you always can trash unused ROM extensions or bitmaps.

    Modern operating systems don't use the BIOS at all past the bootloader

    This is incorrect. Most operative system uses the BIOS well past the bootloader to get the memory map, VGA mode setting and other stuff like setting up BIOS32 structures, even if the are not used later.

    It might be possible to punt out some other chunk of the BIOS to make room, but that's playing with fire. If the machine becomes unbootable, the rootkit won't get very far.

    True, but BIOS persistence is only an additional vector. If it detects an incompatible BIOS, it simple don't use that way to persist on the system.

  • by grimmjeeper ( 2301232 ) on Wednesday September 14, 2011 @01:48PM (#37401168) Homepage

    Given that I've worked for a major CPU company and worked with the BIOS developers on more than one occasion as they debugged problems, I think I can say with some confidence that the modern BIOS is more complex by several orders of magnitude over the primitive BIOS you would find in a PC and AT machine. This explosion in complexity means that it's just not financially possible to fund the development to have a flawless BIOS right out of the gate. There are just too many permutations to consider when developing the system to test them all. And even if you did get a "perfect" BIOS out the door, the chips on the board are so much more complex that they never leave the factory without flaws. Ever. And sometimes you just don't find them until they're in the field and you need to supply a workaround.

  • by lpp ( 115405 ) on Wednesday September 14, 2011 @01:50PM (#37401204) Homepage Journal

    It's not just that it was first discovered by a Chinese security firm. It also appears to be targeted at Chinese PCs. From the original post [webroot.com]:

    The infection is clearly focused on Chinese users, because the dropper is carefully checking if the system it’s going to infect is protected by Chinese security software Rising Antivirus and Jiangmin KV Antivirus.

    Makes one wonder who developed it and what the intent was.

Happiness is twin floppies.

Working...