Feeds

Indestructible, badass rootkit BadBIOS: Is this tech world's Loch Ness Monster? VOTE NOW

Amazing claims of MRSA-like super-malware scrutinised

Internet Security Threat Report 2014

Poll Well-known computer security researcher Dragos Ruiu claims to have been hit by seemingly invincible firmware-infecting malware.

Dubbed BadBIOS, the mysterious rootkit has split the infosec community after Ruiu said the software nasty can jump over air gaps, meddle with a number of different operating systems, and survive motherboard firmware rewrites.

The claims

Once installed and hidden away in the PC's BIOS storage area, the rootkit is supposedly capable of communicating between compromised machines by transmitting data encoded in ultrasonic sound emitted from the device's loudspeakers. Incredibly, nearby infected PCs can, it's alleged, pick up the signal from their microphones and decode the information. This is said to allow the malware to communicate between systems even if there is no other way to exchange information, such as over Wi-Fi, Bluetooth, or an Ethernet connection.

Ruiu reckons BadBIOS, which infiltrated his lab computers, can infect PCs regardless of whether they are running Mac OS X, Windows, Linux, or a flavour of BSD including OpenBSD. The rootkit supposedly infects USB sticks, reprograms their micro-controller firmware to hide itself, and injects itself into a sterile computer once the stick is plugged in.

Indeed, simply by plugging in an infected USB thumb drive, with no other action required, is supposedly enough to catch ‪BadBIOS‬. Canadian Ruiu claims he's been fighting against the terrifying strain for weeks, but nobody else has come across it. The malware can prevent a machine from booting from CD, can stop system administration software from working, and attempts to burn evidence of the nasty onto optical media is thwarted by the rootkit – which, we're told, can hook into classic BIOS, EFI, and UEFI firmware.

The rootkit's ultimate intentions, other than sending out encrypted IPv6 traffic, is not at all clear, it seems.

Ruiu, on Twitter as @dragosr, organises the annual popular Pwn2Own hacking contest at the CanSecWest conference. In response to a handful of questions on the social network, the security-bug researcher said helping to organise the upcoming PacSec event, due to take place in Tokyo in two weeks, is more important right now.

The security conference in Japan may bring much-needed hard information to light on the Abominable malware. Ruiu has suggested he is holding back on the details until patches for software bugs exploited by BadBIOS are made available.

The reaction

The infosec world raised a quizzical eyebrow to the rootkit claims, which has super-villain-like characteristics. Ruiu is a respected expert, but he has yet to release any data for independent corroboration.

Rob Graham of Errata Security has put together a detailed analysis of each element of the claims about ‪BadBIOS‬'s capabilities.

"Everything Dragos describes is plausible. It's not the mainstream of 'hacking', but neither is it 'nation state' level hacking," Graham noted.

An even more sceptical evaluation comes from industry veteran Paul Ducklin, writing on the Sophos Naked Security blog. "It's possible, of course, that this is an elaborate hoax, intended as a combined publicity exercise and social engineering experiment that will be wrapped up at PacSec," said Ducklin.

"If so, expect it to be aimed at outing anyone who jumped to detailed conclusions without having the details to go on!"

Now tell us what you think – vote below and comment away. ®

JavaScript Disabled

Please Enable JavaScript to use this feature.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.