LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 06-17-2022, 02:55 PM   #1
Mark Pettit
Member
 
Registered: Dec 2008
Location: Cape Town, South Africa
Distribution: Slackware 15.0
Posts: 619

Rep: Reputation: 299Reputation: 299Reputation: 299
Virus inside bios - is this possible ?


Slackers - someone in my company was asked if it's possible for a virus to infect a bios, in such a way that's it's permanently there, even after re-installation of an(y) O/S. I'm not at all convinced this is possible - but people are getting pretty smart these days. Has anyone heard of this ? And if it is possible , how does one fix it or recover ?
 
Old 06-17-2022, 02:56 PM   #2
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
Quote:
Originally Posted by Mark Pettit View Post
Slackers - someone in my company was asked if it's possible for a virus to infect a bios, in such a way that's it's permanently there, even after re-installation of an(y) O/S. I'm not at all convinced this is possible - but people are getting pretty smart these days. Has anyone heard of this ? And if it is possible , how does one fix it or recover ?
i have heard that it is possible.

EDIT: here is answer to your question : https://answers.microsoft.com/en-us/...7-757452414975

Last edited by //////; 06-17-2022 at 03:02 PM.
 
1 members found this post helpful.
Old 06-17-2022, 03:09 PM   #3
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,687

Rep: Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715Reputation: 2715
This is pretty much a hardware question. Cases:
A. If you have a traditional PROM bios, one that cannot be upgraded without replacing the physical chip, then the answer is no, unless the virus was placed there at the factory.
B. If you have an EEPROM with no burning circuit on the motherboard then you would have to remove that bios chip (generally socketed, so easy to identify) and place it into an EEPROM burner and burn the virus infected BIOS image onto it to get it infected. For most people this is not really going to fulfill a life goal, so terribly unlikely.
C. If you have a BIOS in an EEPROM or in-place update capable firmware chip with circuitry and code to load an upgrade, then an infected upgrade could populate your chip when you load it and reside in BIOS. If your BIOS is not infected, and you never load an INFECTED BIOS, then you probably need not worry. It is JUST POSSIBLE for you to get a virus that will engage the firmware update process in the background and add live itself to the BIOS, but the virus would pretty much have to be specific to your make and model of hardware: not very likely because not very profitable for the criminal crowd.


Bottom line, if you pull firmware updates,
1, Only get them from the hardware support site and virus scan them with a good tool first.
2. Keep your old updates in a different location so you can back out to an earlier BIOS image to cover yourself in case you get a bad or infected image.

If you are one of the majority that have never applied a firmware update and never will, don't worry about it.

The more significant danger is from encryption based ransomware and traditional malware.
Do you run a malware detection software and do you take regular backups on generational media or images?

Last edited by wpeckham; 06-17-2022 at 03:15 PM.
 
1 members found this post helpful.
Old 06-17-2022, 04:01 PM   #4
jefro
Moderator
 
Registered: Mar 2008
Posts: 22,001

Rep: Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629
The ability to reprogram a bios via software has been around for quite a long time.
The old burned proms couldn't be changed.
 
3 members found this post helpful.
Old 06-17-2022, 04:03 PM   #5
Gerard Lally
Senior Member
 
Registered: Sep 2009
Location: Leinster, IE
Distribution: Slackware, NetBSD
Posts: 2,184

Rep: Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765Reputation: 1765
Quote:
Originally Posted by Mark Pettit View Post
Slackers - someone in my company was asked if it's possible for a virus to infect a bios, in such a way that's it's permanently there, even after re-installation of an(y) O/S. I'm not at all convinced this is possible - but people are getting pretty smart these days. Has anyone heard of this ? And if it is possible , how does one fix it or recover ?
Well I remember Dell shipping motherboards with a virus embedded somewhere in the circuitry. I've a hunch that it is possible to do. Not just to infect firmware but also the ethernet chip, and any chips connected to the keyboard.
 
Old 06-17-2022, 05:25 PM   #6
zaphar
Member
 
Registered: Nov 2012
Distribution: Slackware
Posts: 37

Rep: Reputation: Disabled
Theoretically it is possible, the problem is the firmware is specific to the motherboard, so your specific motherboard would need to be targeted. This makes it unlikely some random hacker dude is going to contaminate your computer. On the other hand, downloading dodgy bios firmware images from random third-party websites could be a way for this to happen. It might also be possible if a malicious program were to make it onto your computer and then accessed a remote library of modified firmware images to download and update. The problem with that, there's a lot of potential motherboards and the library would need to be substantial. There may be a way to have it done dynamically, where the malicious program extracts the bios firmware, modifies it, and then re-flashes it, but I'm not sure if it exists.

Last edited by zaphar; 06-17-2022 at 05:48 PM.
 
Old 06-17-2022, 05:46 PM   #7
zaphar
Member
 
Registered: Nov 2012
Distribution: Slackware
Posts: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by Gerard Lally View Post
Well I remember Dell shipping motherboards with a virus embedded somewhere in the circuitry. I've a hunch that it is possible to do. Not just to infect firmware but also the ethernet chip, and any chips connected to the keyboard.
There was also a way to infect bios option ROMs on expansion cards, but these also need to be specifically targeted so it would be more of a case where a modified card compromises the system.

https://en.wikipedia.org/wiki/BIOS#E...s_(option_ROMs)
 
Old 06-17-2022, 06:33 PM   #8
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 982

Rep: Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667
Nowadays, most computers have UEFI bioses capable of modifying the contents on filesystems. There have been examples of computers shipped with bloatware which gets reinstalled from BIOS even though the hard drive is completely reformatted or replaced:

https://www.theregister.com/2015/08/...irmware_nasty/

Add to this the capability to update UEFI firmware from software and you will end up with news like this:

https://www.theregister.com/2015/08/...irmware_nasty/

regards Henrik
 
Old 06-17-2022, 08:13 PM   #9
enorbet
Senior Member
 
Registered: Jun 2003
Location: Virginia
Distribution: Slackware = Main OpSys
Posts: 4,789

Rep: Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435
Some people consider all modern BIOS/UEFI firmware to ship by default "infected". Intel started it but AMD quickly followed suit with their "Management Engines" proprietary software that has access to CPU, RAM, drives and wifi even in "soft off" state. AFAIK these management engines are in read-only addresses and cannot normally be overwritten, though I have read System 76 claims to disable them.

Ultimately, once BIOS chips were moved to programmable CMOS, firmware just became another form of software, just "in a darkened corner" less visible to Users. Since many motherboards accept Windows GUI BIOS updates, it became a lot easier to hack/infect.
 
2 members found this post helpful.
Old 06-18-2022, 02:01 AM   #10
Mark Pettit
Member
 
Registered: Dec 2008
Location: Cape Town, South Africa
Distribution: Slackware 15.0
Posts: 619

Original Poster
Rep: Reputation: 299Reputation: 299Reputation: 299
Thank you folks - so I can summarize : it is technically feasible, but probably unlikely. If this is a genuine UEFI/BIOS virus (and we were told it was an ASUS gaming pc), then we will no doubt hear a LOT more about it in upcoming weeks. If we hear nothing, then my original theory that it's bunk is more likely. Cheers all.
 
Old 06-18-2022, 03:12 AM   #11
elcore
Senior Member
 
Registered: Sep 2014
Distribution: Slackware
Posts: 1,754

Rep: Reputation: Disabled
Couple of weeks ago, someone made a BIOS module which makes it possible for BIOS to run DOOM. source
By comparison, that is like thousands upon thousands of lines where a typical virus could fit into one line.
 
1 members found this post helpful.
Old 06-18-2022, 06:19 AM   #12
enorbet
Senior Member
 
Registered: Jun 2003
Location: Virginia
Distribution: Slackware = Main OpSys
Posts: 4,789

Rep: Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435Reputation: 4435
Quote:
Originally Posted by Mark Pettit View Post
If this is a genuine UEFI/BIOS virus (and we were told it was an ASUS gaming pc), then we will no doubt hear a LOT more about it in upcoming weeks. If we hear nothing, then my original theory that it's bunk is more likely. Cheers all.
Bunk you say? Because it isn't widely discussed? Do we see legions of outraged people complaining about recent MS EULA conditions that phone home your data including email even if they are encrypted? No, because most Windows users don't even bother to read EULAs and just click OK to get on with it.

Specific to BIOS hacks and since I've already mentioned that it is possible to completely overwrite any writable address blocks in Firmware right from a Windows Desktop environment, I'll jump right to the beginning, management engines.

You probably won't actually be interested enough to watch more than a few minutes of it (it's nerdy dry faire) but here is but one example of the access afforded at such a fundamentally low level access and communication as of 2015. It's somewhat easier now and the incredible growth of user data mining has massively increased the motivation to employ. Don't forget BIOS/UEFI is higher priority than even PID 1 by a long shot. That may possibly be mitigated by System 76's alleged disabling mechanism, but I'm not certain how they can even know it works at all let alone at 100%. If it wasn't a bit scary it's be laughable that there was uproar over Intel including unique CPU serial number data in BIOS yet so little over ME.

https://www.youtube.com/watch?v=rcwngbUrZNg

Note: If you really can't manage to watch much of it, there's an instructive diagram around 17:45. The hardware diagram is a known quantity. The code is not.
 
3 members found this post helpful.
Old 06-18-2022, 08:25 PM   #13
Gnisho
Member
 
Registered: Aug 2012
Location: WA
Distribution: slackware
Posts: 73

Rep: Reputation: Disabled
Proof of concept for virus in BIOS was done at least as early as 2012.

https://www.pcworld.com/article/4602...ork_cards.html

As far as I know, further work since then has consisted of more research and a few specific targeted attacks. As others have mentioned, virus needs to know intimate details to target specific boards and BIOS vendors. Fortunately for the black hats, to cover the majority of the market you only need implementation details on about a half dozen BIOS vendors and maybe a dozen chips.
 
Old 06-19-2022, 05:57 PM   #14
SCerovec
Senior Member
 
Registered: Oct 2006
Location: Cp6uja
Distribution: Slackware on x86 and arm
Posts: 2,477
Blog Entries: 2

Rep: Reputation: 982Reputation: 982Reputation: 982Reputation: 982Reputation: 982Reputation: 982Reputation: 982Reputation: 982
So, in effect, YES
 
Old 06-20-2022, 12:46 AM   #15
zaphar
Member
 
Registered: Nov 2012
Distribution: Slackware
Posts: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by Gnisho View Post
Proof of concept for virus in BIOS was done at least as early as 2012.

https://www.pcworld.com/article/4602...ork_cards.html

As far as I know, further work since then has consisted of more research and a few specific targeted attacks. As others have mentioned, virus needs to know intimate details to target specific boards and BIOS vendors. Fortunately for the black hats, to cover the majority of the market you only need implementation details on about a half dozen BIOS vendors and maybe a dozen chips.
It probably isn't that easy. If it was, coreboot and associated BIOS/UEFI replacement firmware would work on a lot more platforms, instead of the handful it does.
 
  


Reply

Tags
bios, virus



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Possible to have a VM inside a VM, inside a VM? Into eternity? linus72 Linux - Newbie 8 05-15-2009 07:20 AM
possible HW list OC; by MoBo, CPU, Mem, BIOS CPU x Addition HCL (stock BIOS settings) digital8doug Linux - General 17 12-15-2006 07:01 PM
Boot virus or Anti-Virus? AVG Free Anti-Virus Software problems SparceMatrix Linux - Security 9 08-02-2004 02:35 PM
trend chipway virus detected boot virus rafc Linux - Security 1 05-13-2004 01:44 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 02:54 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration