We should all be very, very cautious in the near future until something comes along to remove this threat.
“A pair of Argentinean researchers have found a way to perform a BIOS level malware attack capable of surviving even a hard-disk wipe. Alfredo Ortega and Anibal Sacco from Core Security Technologies — used the stage at last week’s CanSecWest conference to demonstrate methods (PDF) for infecting the BIOS with persistent code that will survive reboots and re-flashing attempts. The technique includes patching the BIOS with a small bit of code that gave them complete control of the machine. The demo ran smoothly on a Windows machine, a PC running OpenBSD and another running VMware Player.”
http://i.zdnet.com/blogs/core_bios.pdf
http://threatpost.com/blogs/researchers-unveil-persistent-bios-attack-methods
You must be logged in to post a comment.
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 | 31 |
38 queries. 0.053 seconds
July 6th, 2009 at 2:49 pm
Yep. I have one it runs with both HDD removed and pc powered up into set up it goes mad flashing from menu to submenu and asks to save –yes no and bleeps all the time.