to a.p.s only
FromTheRafters wrote:
> In fact, I am probably the only one here that accepts that an attacker
> with access to (and intimate knowledge of) a particular computer can
> compromise firmware in such a way as to have a *persistant* compromise
> of the machine even if the harddrive is swapped out.
>
> ...and even then, such a machine would have to have a network available
> for bootstrapping the malicious code.
The wiki article on rootkits has a section on firmware exploitation,
which had links to the articles on the 'laboratory' example of infecting
the Award Phoenix BIOS, which the investigators are further developing
to be a more 'generic' tool. In addition, there is a 'new' development
for a CompuTrace LoJack in the BIOS designed/intended as anti-theft
which can be subverted to malware purposes.
And the BIOS isn't the only firmware place the malware can be installed.
But I don't know of any 'in the wild' malware which can do these things
by remote exploitation. The experiments and real-life exploits required
physical access to the computers or control at root level. Naturally
control at root level could be achieved remotely, but all of that kind
of firmware manipulation isn't really the same as 'picking up an infection'.
--
Mike Easter


Reply With Quote
thinking that they can reload
)