Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

BIOS-level viruses and rootkits
http://www.tomshardware.com/news/bios-virus-rootkit-security-backdoor,7400.html ^ | 03/27/09 | Marcus Yam

Posted on 12/30/2009 8:33:14 PM PST by wendy1946

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 next last
To: ThunderSleeps
Possibly due to the means of flashing the bios? The attack program to install the bios virus may be windows specific...

Or, if there is no BIOS to flash...

21 posted on 12/30/2009 10:42:09 PM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Swordmaker
You're like that old guy in My Big Fat Greek Wedding who believes everything in the world comes from Greece or Greek origins. In your case, however, you refuse to believe that Apple or its products have every had any flaw or have ever done anything wrong.

For example, you cut and pasted from Wikipedia regarding EFI and pretend to know what that means. You couldn't even be troubled to read the original article and find out that one of the researchers said the following: "There is the possibility that newer types of Extensible Firmware Interface Bios may be resistant to the attack, but more testing is needed." It is apparent that the researchers use the term "BIOS" to cover all types, including EFI. Note that EFI, like Open Firmware before it, is actually a type of BIOS. While you can pretend that Macs are immune (as you always do) I feel obligated to point out where you are being misleading.
22 posted on 12/31/2009 7:05:04 AM PST by flintsilver7 (Honest reporting hasn't caught on in the United States.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: flintsilver7
It is apparent that the researchers use the term "BIOS" to cover all types, including EFI. Note that EFI, like Open Firmware before it, is actually a type of BIOS. While you can pretend that Macs are immune (as you always do) I feel obligated to point out where you are being misleading.

Please show me where, in any way, I have claimed that Macs do not have flaws or have not done anything wrong. That is a strawman argument that you have posted so you can shoot it down... just as your claim that Macs are vulnerable to a BIOS attack when they do not use a simple BIOS.

No, Flintsilver, it is NOT apparent that the researchers are using the term BIOS to cover all types, including EFI. If they were, they would specifically state so. They did not. You are mischaracterizing the nature of the threat to include EFI so as to include it in the nature of the threat that YOU want to include Macs. Yes, I borrowed the explanation of the EFI from Wikipedia because it was the easiest to provide... so what. I read the original article... and noted what the researchers said. They said: THEY DON'T KNOW... because they haven't made the effort. If it was as easy as you seem to think, they would have. Macs use an encrypted EFI, not a basic BIOS. It is far harder to crack than an open BIOS available to anyone to change.

In addition, this exploit requires that the attacker either have physical access to the machine with a ROOT password (something that is disabled by default on Macs as shipped), or to be able to be gain Administrator level access by use of a virus—something that has not been accomplished in almost nine years of trying on a Mac—and still would have to scale the next wall to ROOT, to be vulnerable to this means of attack. Again, a very high requirement.

When it happens, we'll start worrying. In the meantime, enjoy your swiss cheese systems.

YOU want the Macs to be as vulnerable to this means of attack, but, Flint, they simply are not.

23 posted on 12/31/2009 3:45:26 PM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker

http://eecue.com/log_archive/eecue-log-724-Black_Hat_2007___Day_2___John_Heasman.html

http://eecue.com/log_archive/eecue-log-724-Black_Hat_2007___Day_2___John_Heasman.html

Of course, it would seem that you, certified Message Board Mac Apologist, are correct, and John Heasman, Director of Research for NGS Consulting, is wrong. You aren’t willing to do any sort of research so I apparently have to do it for you. I assume you will be more than capable of reading the above links that illustrate that you are, in fact, dead wrong.


24 posted on 12/31/2009 9:28:41 PM PST by flintsilver7 (Honest reporting hasn't caught on in the United States.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Swordmaker

http://www.ngssoftware.com/research/papers/BH-VEGAS-07-Heasman.pdf

(Corrected second link.)


25 posted on 12/31/2009 9:29:10 PM PST by flintsilver7 (Honest reporting hasn't caught on in the United States.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: flintsilver7; Star Traveler; antiRepublicrat
Of course, it would seem that you, certified Message Board Mac Apologist, are correct, and John Heasman, Director of Research for NGS Consulting, is wrong. You aren’t willing to do any sort of research so I apparently have to do it for you. I assume you will be more than capable of reading the above links that illustrate that you are, in fact, dead wrong.

Gee, Flint, ignoring your snide ad hominem insults, I will respectfully disagree with him and you, without insulting you.

Flint, I read that article almost three years ago after the Black Hat Conference where this "expert," John Heasman, predicted these dire events involving EFI and Mac OS X. In two months it will be three years since he talked about the all these vulnerabilities of EFI. Just because someone says there are vulnerabilities does not mean they can easily be exploited. So, Flint, if Heasman was right three years ago, where ARE the exploits and root kits for Mac OS X? They have not materialized. Where are all the invade and compromised OS X Macs?

The fact is that, so far, no one has found a way to exploit the encrypted EFI of OS X or, at least to scale the mountain of gaining access to install such an exploit remotely. How do you account for that lack of rootkit malware in Mac's EFI, if, as you and Heasman claim, it's so vulnerable?

26 posted on 12/31/2009 11:34:26 PM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 24 | View Replies]

To: flintsilver7

By the way, happy new year!!!!


27 posted on 12/31/2009 11:36:12 PM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Swordmaker

I don’t consider them ad hominem attacks as I’m pretty sure that you are in fact what I state. It wasn’t name calling, rather a statement of fact. Also, Happy New Year to you.

As you may or may not know, sub-OS level attacks such as these remain interesting only in the theoretical or academic sense. Most everybody who works on them acknowledges that while they are possible they are not particularly useful or worthwhile. If you have physical access to a machine, regardless of what operating system it runs it will be much easier to compromise using some other method than a sub-OS level exploit. I don’t know one way or the other how (or actually if) EFI is encrypted, and I am quite familiar with the topic. For starters, no papers on the subject of hacking EFI mention anything about encryption.

That said, you are simply changing your argument to instead say that because you don’t know of any EFI exploits that exist that they are either difficult or impossible. I might very well ask you where are all the sub-OS level exploits for BIOS machines. The fact is that they remain little more than a curiosity to hackers, yet both types of current systems are vulnerable. Heasman mentions the following:

“SMM (System Management Mode) has been used in the past to disable BSD SecureLevel by Loic Duflot.”

“Modifying the boot loader is actually quite simple in Mac OSX as the bootloader binary is located in user disk space.”

“The bottom line is that with the added functionality, EFI offers an attacker many more options than BIOS for exploitation.”

All of these factors taken together illustrate to me that both EFI and BIOS systems are vulnerable, with BSD (arguably the most secure operating system in existence) and OS X being mentioned by name. No hackers are running out to implement these theoretical exploits for either BIOS systems or EFI systems, and you might notice the choice of operating system means nothing.

I just get sick and tired of you continually changing your argument or blatantly stating falsehoods when you are likely giving people a false sense of security. Do you think Apple regular patches their critical security vulnerabilities for the hell of it? A recent Java exploit allowed machines to be fully compromised. Apple patched it. That’s pretty much exactly the same scenario that plays out on Windows - find a critical vulnerability and patch it. There’s even a book on OS X exploits. Google “OS X exploits” and you’ll find plenty. Secunia lists quite a few critical vulnerabilities for OS X.

The point is that malware and exploits do exist for OS X, and based on the available numbers it would be incredibly inaccurate to state any of the major operating systems are more secure than any of the others (with the possible exception of some Linux systems). You may not want to believe that but it is, in fact, true. It was just as true in the past as it is today.


28 posted on 01/01/2010 7:33:58 AM PST by flintsilver7 (Honest reporting hasn't caught on in the United States.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: flintsilver7; antiRepublicrat; Star Traveler
As you may or may not know, sub-OS level attacks such as these remain interesting only in the theoretical or academic sense. Most everybody who works on them acknowledges that while they are possible they are not particularly useful or worthwhile. If you have physical access to a machine, regardless of what operating system it runs it will be much easier to compromise using some other method than a sub-OS level exploit. I don’t know one way or the other how (or actually if) EFI is encrypted, and I am quite familiar with the topic. For starters, no papers on the subject of hacking EFI mention anything about encryption.

And what was I telling you? That this exploit required physical access to the computer. Apple takes a multi pronged approach to computer security. Charlie Miller, who regularly makes pronouncements that Macs are not as secure as Windows computers despite the fact that Windows computers are compromised far more than Macs, does so because Apple does not make as complete a use of memory space randomization as does Microsoft, ignoring other equally valid choices that Apple has made instead such as more complete use of the non execute for data stack and heaps than does MS as well as other security measures. His criteria was that sole issue, his personal benchmark of security.

Rootkits HAVE been a problem on Windows machines... and they have been done remotely. They have not been a problem on Macs.

I just get sick and tired of you continually changing your argument or blatantly stating falsehoods when you are likely giving people a false sense of security. Do you think Apple regular patches their critical security vulnerabilities for the hell of it? A recent Java exploit allowed machines to be fully compromised. Apple patched it. That’s pretty much exactly the same scenario that plays out on Windows - find a critical vulnerability and patch it. There’s even a book on OS X exploits. Google “OS X exploits” and you’ll find plenty. Secunia lists quite a few critical vulnerabilities for OS X.

Now you claim I am a liar who changes changes his arguments. You claim you are not using Ad Hominem and then pile on more insults and more slurs. I am done with you. I have not changed my argument one iota. I am quite well aware of the number of vulberabilities a Google search will come up with. A vulnerability does not an exploit make.

29 posted on 01/01/2010 12:33:08 PM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

30 posted on 01/04/2010 5:13:37 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: flintsilver7
Most BIOSes these days are write-protected, meaning you need to explicitly allow writing before any such attack would work.

Most BIOS's can be rewritten from the web. My MSI motherboard has a page I can go to and a program that allows MSI to upgrade my BIOS.

There must be a way to turn that off.

Also my Toshiba laptops have the same capability.

31 posted on 01/04/2010 5:24:48 AM PST by raybbr (If you try to kiss your son on the head while he's running you WILL get a fat lip.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Omedalus
This family of viruses infects the BIOS. It’s active and infectious regardless of what OS is installed on the machine. Why do you believe your Mac is immune to this?

Well, like the OS, the BIOS chip in the Mac would make a smaller, less efficient target for virus developers than those in Win-boxes. Plus, maybe Mac's BIOSes can't be flashed? Or there's some sort of hard lockout like the mentioned jumper or DIP switch.

32 posted on 01/04/2010 8:13:43 AM PST by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Omedalus
This family of viruses infects the BIOS. It’s active and infectious regardless of what OS is installed on the machine. Why do you believe your Mac is immune to this?

Even if somebody made one for the EFI in a Mac, there's the problem that it requires explicit administrator permission to flash. If you're allowing your firmware to be flashed by any source other than System Update, you are pretty much hopeless anyway.

And this isn't simply Windows UAC that can be bypassed. UAC is more of a layer over everything that points out when admin privileges should be required, as evident by Microsoft easily changing that list due to complaints. While the system was designed to have admins and users, in reality most people ran with elevated privileges, and most programs expected the user to have them. This created a huge backwards compatibility problem for Windows, thus the weak UAC.

On a Mac most of the UAC equivalent is a result of the underlying UNIX security architecture, which was designed from the beginning to differentiate between user and admin actions and has always been used that way. I say "most of" because adding admin authentication is optional for many simpler actions in order to increase security, such as connecting to a wireless network. But important things, like flashing EFI or installing updates, always require an admin password, and can't be turned off or (at least so far) bypassed.

33 posted on 01/04/2010 9:00:43 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 5 | View Replies]

To: Star Traveler
Unix type operating systems of most all flavors are more resistant to bad stuff than Windows...that includes Windows 7...

My daughter is fighting that problem .

Apple has a foundation with the Berkeley version of Unix....BSD.

34 posted on 01/04/2010 10:42:33 AM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker
My kids gave me a Win XP netbook for Christmas since I'll do some traveling and staying where there's WiFi available. But as you know I'm paranoid about viruses unless I'm running a Mac or Linux. So I contemplate loading Linux onto a USB flashdrive.

My wants are:

  1. Freeping and email
  2. Downloading Rush's program via Rush24/7 account
  3. Writing Rush's program onto wife's iPod.
  4. Skype (I notice that Skype offers a beta version for operation under Linux).
I found that Ubuntu offers a netbook-specific distribution on their site. Ubuntu has open source spreadsheet and word processing, and seems to be designed to talk to Microsoft Office. That could turn out to be useful.

any Linux distro would, I assume, work for Freeping and email. But apparently even if I use iTunes on the XP system and use WinXP online to get the audio files, there's incompatibility between Microsoft's FAT32 and the way the iPod has been formatted by the Mac. If I had first formatted the iPod on a PC running iTunes, I'd have been OK, but . . .

Go figure.


35 posted on 01/04/2010 10:45:58 AM PST by conservatism_IS_compassion (DRAFT PALIN)
[ Post Reply | Private Reply | To 29 | View Replies]

To: Omedalus; antiRepublicrat
Both LINUX and MAC operating systems are build with the mentioned structure as pointed out in post #33 by antiRepublicrat
36 posted on 01/04/2010 10:46:22 AM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Ernest_at_the_Beach

Working with both Windows and Macintosh sure makes one appreciate the Macintosh a whole lot more... :-)


37 posted on 01/04/2010 10:52:28 AM PST by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker
Macs are EFI machines.

Thanks,....didn't know that...

38 posted on 01/04/2010 10:54:50 AM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 20 | View Replies]

To: conservatism_IS_compassion
Ubuntu has open source spreadsheet and word processing, and seems to be designed to talk to Microsoft Office. That could turn out to be useful.

If you're talking about Open Office, I tried it and it's very good, but I found it lacked enough of the things I regularly use in Office that I personally couldn't use it. (Writer & Calc vs. Word & Excel) But then I'm kinda weird and use some obscure things so the average business user might not notice any problems.

39 posted on 01/04/2010 10:57:40 AM PST by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 35 | View Replies]

To: antiRepublicrat
Windows UAC

Bing search>>>

Windows 7: User Account Control (UAC) overview

One of the highly criticized features in Windows Vista is the User Account Control(UAC) which prompts up a dialog box seeking users' permission to continue or stop whenever a system-level change is made. The problem with Vista is that even the default user account which is created during the install, who is a protected administrator (unlike in XP where the user is an Administrator), could not bypass the UAC until its tweaked. This created lots of criticism and the feature which was built to make Vista secure became the most hated feature amongst users. Of course, this was a drastic change for Microsoft and as well as end users who were very much inclined to a single user account (till Windows XP) who is an Administrator.

One of the major complaints was that the UAC involved more clicks to execute a program when such system-level change occurred. And the other - there were only two options provided by Microsoft in Vista's Control Panel - either Turn On UAC or Turn Off UAC. Users did not have much control over the behaviour of UAC notifications.

How far has this changed in Windows 7?

When the E7 Team blogged about UAC, it was clear that Microsoft was taking the user feedback seriously about the issues and problems they currently face using UAC in Vista.

In Windows 7, Microsoft has given options for the users to select their 'comfort level' in UAC notifications and also improved the user interface by providing more relevant and additional information. The default user account created during the installation in Windows 7 is still a protected administrator but with a different UAC setting:

***********************************************

Any comments on this?

40 posted on 01/04/2010 11:02:30 AM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 33 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson