LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 08-17-2019, 08:12 PM   #1
hddfsck
Member
 
Registered: Aug 2019
Distribution: Debian; Ubuntu
Posts: 122

Rep: Reputation: Disabled
If I use an infected computer with a linux OS, and etcher validates my .iso transfer, does that mean my sd-card is clean?


Hypothetically, if I use a computer with a linux OS, and let's say there is malware in the bios and the firmware and the hdd. And I download an .iso and transfer it to my usb-card reader using etcher, and etcher 'validates' my .iso transfer, and then unmounts immediately afterwards, as it does, would that mean the new linux OS on my sd-card is clean, or could it still be infected?
 
Old 08-18-2019, 05:36 AM   #2
berndbausch
LQ Addict
 
Registered: Nov 2013
Location: Tokyo
Distribution: Mostly Ubuntu and Centos
Posts: 6,316

Rep: Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002Reputation: 2002
etcher just validates that the data on the card is identical to the data on the ISO file. It doesn't check for malware.

I don't know how your hypothetical infections can be transferred to the ISO file, but my ignorance won't protect you.
 
Old 08-18-2019, 05:46 AM   #3
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 22,040

Rep: Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347Reputation: 7347
yes, it actually depends (may depend) on the malware itself. If that was able to do something tricky (unexpected) ...
 
Old 08-18-2019, 06:14 AM   #4
fatmac
LQ Guru
 
Registered: Sep 2011
Location: Upper Hale, Surrey/Hants Border, UK
Distribution: Mainly Devuan, antiX, & Void, with Tiny Core, Fatdog, & BSD thrown in.
Posts: 5,521

Rep: Reputation: Disabled
If worried about an infected download, I'd create an md5sum of your downloaded .iso, then check it online, (that is, don't download the md5sum), against the genuine md5sum issued by the distro website.

Last edited by fatmac; 08-18-2019 at 06:15 AM.
 
Old 08-18-2019, 09:38 AM   #5
rtmistler
Moderator
 
Registered: Mar 2011
Location: USA
Distribution: MINT Debian, Angstrom, SUSE, Ubuntu, Debian
Posts: 9,883
Blog Entries: 13

Rep: Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931Reputation: 4931
Quote:
Originally Posted by hddfsck View Post
Hypothetically, if I use a computer with a linux OS, and let's say there is malware in the bios and the firmware and the hdd. And I download an .iso and transfer it to my usb-card reader using etcher, and etcher 'validates' my .iso transfer, and then unmounts immediately afterwards, as it does, would that mean the new linux OS on my sd-card is clean, or could it still be infected?
How is it that you've concluded that you have malware in BIOS, in firmware, as well as the HDD?
  1. You can upgrade BIOS by booting your system live and programming newer, or the same version to the BIOS. You just have to prepare all the files and utilities for this in advance.
  2. What exact firmware are you complaining about? For instance on a motherboard, the firmware is the BIOS. Granted there are other cards which can have firmware, but you've not been specific enough here.
  3. If you suspect a hard drive, you can set it aside and use an entirely clean one. You can also attempt to wipe a hard drive completely, but if you do not trust any wiping actions, then do not use the hard drive.
If you suspect that you have an infected system, and at several levels in that system, then deal with each component independently, clean them to your satisfaction, and the proceed to install a fresh OS. Further, do not use this system until you feel you have sufficiently cleaned it. If this is your only system and you have nothing else to use, then recommend you approach a friend, relative, or person you know who has a PC and see if they can help you download the utilities you need onto fresh media.
 
Old 08-18-2019, 10:25 AM   #6
ehartman
Senior Member
 
Registered: Jul 2007
Location: Delft, The Netherlands
Distribution: Slackware
Posts: 1,674

Rep: Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888
Quote:
Originally Posted by fatmac View Post
If worried about an infected download, I'd create an md5sum of your downloaded .iso, then check it online, (that is, don't download the md5sum), against the genuine md5sum issued by the distro website.
But what if your system is infected in such a way that md5sum (and other checking programs) are infected too and deliver the wrong (compared to NON-infected) answers.
With an infected system all bets are off.
Note that the OP was talking about a BIOS infection, so just booting up a live-system isn't enough, the only way is to check the iso on a NON-infected system (which on ITS turn should be checked first from an original live-system DVD, preferable NOT a burned one).

Last edited by ehartman; 08-18-2019 at 10:28 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Has anyone tried Etcher a new way to burn iso's to sd/flash drives reinfro555 Linux - Software 2 05-31-2016 09:35 PM
LXer: Etcher – Easy way to Create a bootable USB drive & SD card from an ISO image LXer Syndicated Linux News 0 05-31-2016 08:21 AM
Encrypted archive that validates itself against malicious change Ulysses_ Linux - Security 6 03-18-2016 08:40 AM
LXer: Shuttleworth: Oracle's Sun buy validates open source LXer Syndicated Linux News 0 04-20-2009 06:51 PM
LXer: Novell Claims Red Hat Desktop Move Validates Its Strategy LXer Syndicated Linux News 0 03-21-2007 04:46 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 09:27 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration