Hard Light Productions Forums

Off-Topic Discussion => General Discussion => Topic started by: jr2 on October 31, 2013, 02:28:34 pm

Title: WTF?
Post by: jr2 on October 31, 2013, 02:28:34 pm
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/

 :wtf:

Not sure if Halloween hoax or serious. To infect a firmware, would require knowledge of the specific configuration of the machine, right? As the firmware is responsible for all low-level functions of the device it is specific to.

Would such a piece of malware even be possible? 
Title: Re: WTF?
Post by: Kopachris on October 31, 2013, 02:31:43 pm
BIOS viruses are nothing new, afaik.
Title: Re: WTF?
Post by: jr2 on October 31, 2013, 02:33:26 pm
This one supposedly infects different architectures and communicates via ultrasonic.
Title: Re: WTF?
Post by: Kopachris on October 31, 2013, 02:47:05 pm
So it's more advanced and tenacious than previous BIOS malware.  The communicating via ultrasonic thing is impressive, though.

Also,
Quote
We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of the sudden the search function in the registry editor stopped working when we were using it to search for their keys.
Commence Skynet jokes.
Title: Re: WTF?
Post by: pecenipicek on October 31, 2013, 02:58:31 pm
"Air gapped"

what are these? ****ing transformers?


the whole article sounds like some quack going "no honest, look its real, i'm telling you!!!!"


and ars being the ****ty site it is.
Title: Re: WTF?
Post by: MP-Ryan on October 31, 2013, 03:13:17 pm
It's hard to believe a story like that, but one also has to consider the source...

...which leads me to wondering:  whose high-security malware attack on whom got loose in Dragos' lab?  This little bastard sounds like the logical evolution of the national security programs that created the likes of stuxnet and flame - and they sat in infected systems for years before going into the wild.

Unfortunately, the list of countries with this kind of technical sophistication runs over a dozen, and there are certainly a number of IT security individuals out that that could build something this clever too.

You have to wonder if Iran is about to scrap a bunch of their IT infrastructure and start buying new machines, though.
Title: Re: WTF?
Post by: Rodo on October 31, 2013, 03:15:34 pm
Another of those virus that I'll never get the chance to see, probably cause I'm not the kind of guy that clicks on every DOWNLOAD NOW button I see lost in the interness.
Title: Re: WTF?
Post by: MP-Ryan on October 31, 2013, 03:23:24 pm
Another of those virus that I'll never get the chance to see, probably cause I'm not the kind of guy that clicks on every DOWNLOAD NOW button I see lost in the interness.

If this thing IS in the wild, chances are most people probably don't even know their systems are infected.  And the vector appears to be simply plugging in a USB stick that has been in an infected machine (regardless of whether it has been wiped or not).
Title: Re: WTF?
Post by: Rodo on October 31, 2013, 03:41:40 pm
Still from what I read some strange behaviour is to be expected from the infected machines, such as no cd booting, getting random data deleted and antivirus/spiware troubleshooting tools malfunction.
I'm in the clear so far for sure.
About the virus itself, I'm pretty sure this article was made just to inflict some kind of concern on less educated pc users and that some of it's facts are exaggerated.
Title: Re: WTF?
Post by: MP-Ryan on October 31, 2013, 05:50:22 pm
You might want to check out Drogo Ruiu's Twitter feed.
Title: Re: WTF?
Post by: The E on October 31, 2013, 06:31:22 pm
Yeah, at first I was like "WTF, this can't be real" as well.

But it's all definitely possible. Whether it's actually practical is a different question, but nothing here is impossible.
One should definitely keep in mind that noone is claiming that a machine could be infected simply by sitting next to an infected machine; the initial vector seems to be a buffer overflow triggered by a compromised USB device. Once the malware has gained access to the machine that way, then the magic bits with high-frequency audio signals used as net interfaces starts.

But all in all? It's a very very scary and pretty damn sneaky attack, one whose ingenuity I definitely applaud.
Title: Re: WTF?
Post by: yuezhi on October 31, 2013, 06:33:09 pm
ALL HAIL LORD MEGABAYTRON
Title: Re: WTF?
Post by: Lorric on October 31, 2013, 06:44:27 pm
one whose ingenuity I definitely applaud.
Why? Whoever made it is scum.
Title: Re: WTF?
Post by: The E on October 31, 2013, 07:04:50 pm
one whose ingenuity I definitely applaud.
Why? Whoever made it is scum.

Whoever made it is an ingenious hacker who identified and exploited critical vulnerabilities in at least two subsystems common to pretty much all PCs.
Don't get me wrong, malware writers really are scum. There is no doubt about it. But just because they're using their talents for evil does not mean that one cannot appreciate the skill behind this. It's the same kind of grudging respect one pays to a superior, if infuriating, player in any game you care to mention.

This may be something you haven't had contact with, but this kind of really really clever exploit is the stuff of hacker1 legend. It's right up there in terms of deviousness and ingeniousness with the Thompson Trust Exploit (http://cm.bell-labs.com/who/ken/trust.html) and Robin Hood and Friar Tuck (http://www.catb.org/jargon/html/meaning-of-hack.html), and the tale of Mel, a real programmer (http://www.catb.org/jargon/html/story-of-mel.html).



1 Hacker, in this case, referring to the original meaning of the word, as explained here (http://www.catb.org/jargon/html/H/hacker.html).
Title: Re: WTF?
Post by: Lorric on October 31, 2013, 07:22:16 pm
Yes, talent can be acknowledged even if done for evil, but not praised.

Such people would never get a scrap of respect from me. Perhaps fear, but never respect. It's all the worse because they have talent as opposed to some deadbeat who can't do any better. They could be putting it to constructive instead of destructive use.

I might check the links later.
Title: Re: WTF?
Post by: redsniper on November 01, 2013, 05:06:12 pm
Quote
the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps.

:lol: :shaking:

Hahahaha seriously? Holy **** this is some mindless hollywood thriller **** and yet it's actually real. I don't know if I'm ready for our dystopian cyberpunk present.
Title: Re: WTF?
Post by: MP-Ryan on November 02, 2013, 08:53:06 am
Yes, talent can be acknowledged even if done for evil, but not praised.

Such people would never get a scrap of respect from me. Perhaps fear, but never respect. It's all the worse because they have talent as opposed to some deadbeat who can't do any better. They could be putting it to constructive instead of destructive use.

I might check the links later.

You appear to be forgetting that most of the world's information security agencies - who are generally on the side of righteousness, NSA shenanigans aside - hire exactly these sorts of people.

The likes of stuxnet and flame set Iran's nuclear program back by years, if not indefinitely.  That is no small thing, especially as it was done without loss of human life.

Infowarfare and infosecurity are really important fields, and protecting people largely relies on other people with skills like these.  As I said earlier, I would bet good money that this beats Dragos encountered originates from an InfoSec program.
Title: Re: WTF?
Post by: Lorric on November 02, 2013, 09:54:21 am
Yes, talent can be acknowledged even if done for evil, but not praised.

Such people would never get a scrap of respect from me. Perhaps fear, but never respect. It's all the worse because they have talent as opposed to some deadbeat who can't do any better. They could be putting it to constructive instead of destructive use.

I might check the links later.

You appear to be forgetting that most of the world's information security agencies - who are generally on the side of righteousness, NSA shenanigans aside - hire exactly these sorts of people.

The likes of stuxnet and flame set Iran's nuclear program back by years, if not indefinitely.  That is no small thing, especially as it was done without loss of human life.

Infowarfare and infosecurity are really important fields, and protecting people largely relies on other people with skills like these.  As I said earlier, I would bet good money that this beats Dragos encountered originates from an InfoSec program.
Well I would want them working to protect people from this, using their talent for that instead of creating malicious programs to harm people.

A bit like I saw a program (TV program), and there was this guy who kept getting around this club's security, so they hired him as their head of security. And he turned the place into the most secure club in the area.
Title: Re: WTF?
Post by: Dragon on November 02, 2013, 10:16:25 am
It's a pretty well known practice. Hiring hackers to watch the security of the very system they once hacked is a known and rather efficient trick. White Hat hackers even make a living out of this, hacking into things in order to show their vulnerabilities.
Title: Re: WTF?
Post by: Lorric on November 02, 2013, 10:20:15 am
It's a pretty well known practice. Hiring hackers to watch the security of the very system they once hacked is a known and rather efficient trick. White Hat hackers even make a living out of this, hacking into things in order to show their vulnerabilities.
Indeed. It's not the talent/skill set I have a problem with, it's what you use it for.

There are also some hackers who are harmless, they'll hack into things simply for the pleasure and challenge of doing it. They won't actually do any harm once they're in.
Title: Re: WTF?
Post by: Dragon on November 02, 2013, 10:28:55 am
Many White Hats work like this. The only thing they leave is a gentle message explaining how they got in and tips how to fix it. Both sides benefit from that. The target gains increased security, the hacker gets a more challenging target. :)
Title: Re: WTF?
Post by: Lorric on November 02, 2013, 10:38:18 am
It's the first time I've heard the term "White Hat Hacker" before.

So in a nutshell, I guess it comes down to "what hat do you wear?" :)

(http://blog.rivalhost.com/wp-content/uploads/2013/06/white-hat-vs-black-hat1.jpg)
Title: Re: WTF?
Post by: Rodo on November 02, 2013, 10:43:23 am
Isn't there one that says "I wuv bacon" for me?

Anyways, the guy that made this airgap-jumper piece of soft must be a genius.
That or have enough time to spare.
Title: Re: WTF?
Post by: yuezhi on November 02, 2013, 12:20:08 pm
Lulzsec now sounds like cavemen.
Title: Re: WTF?
Post by: Phantom Hoover on November 02, 2013, 03:07:21 pm
lulzsec were always cavemen, they were just cavemen who happened to be a convenient focal point for press alarmism
Title: Re: WTF?
Post by: Bobboau on November 03, 2013, 09:18:51 pm
(http://blog.rivalhost.com/wp-content/uploads/2013/06/white-hat-vs-black-hat1.jpg)

please tell me those are reversible.
Title: Re: WTF?
Post by: BloodEagle on November 04, 2013, 12:48:28 pm
It's the first time I've heard the term "White Hat Hacker" before.

So in a nutshell, I guess it comes down to "what hat do you wear?" :)
[...]

There are three hats (IIRC) to hacking:  White hat, red hat, and black hat.  Think D&D Alignment.
Title: Re: WTF?
Post by: AdmiralRalwood on November 04, 2013, 01:00:36 pm
Gray hat; red hat is a company/linux distro (http://en.wikipedia.org/wiki/Red_Hat).
Title: Re: WTF?
Post by: Ghostavo on November 07, 2013, 10:07:38 am
http://arstechnica.com/security/2013/11/researcher-skepticism-grows-over-badbios-malware-claims/

It seems the researcher might have been too paranoid.
Title: Re: WTF?
Post by: Rodo on November 07, 2013, 10:17:39 am
Well well, not really that surprised by this.
Title: Re: WTF?
Post by: TwentyPercentCooler on November 07, 2013, 06:29:43 pm
This sounds like a terrible "hacker" movie where Hollywood writers show off their ignorance, and yet...it's plausible.

If there actually are things like this "in the wild," can you imagine the kind of **** that's still in a lab, not quite ready to destroy things yet? That's a bit scary.
Title: Re: WTF?
Post by: An4ximandros on November 08, 2013, 09:23:35 am
Well if this thing was real, we would have likely faced a Cylon virus attack.
Title: Re: WTF?
Post by: Mikes on November 14, 2013, 12:18:53 pm
Well if this thing was real, we would have likely faced a Cylon virus attack.

If all it does is annoy some researcher in a lab for 3 years without breaking out .... ;)