瑞星卡卡安全论坛综合娱乐区Rising茶馆 “武器级恶意程序”badBIOS——瑞星拿到样本没?

12   1  /  2  页   跳转

[侃谈天下] “武器级恶意程序”badBIOS——瑞星拿到样本没?

“武器级恶意程序”badBIOS——瑞星拿到样本没?

在国外网站看到的报道。据说这货2013-11月底已经出笼。比较惊恐的是:据说这货是借助扬声器和麦克传播,且是个跨平台的恶意程序,可在MAC OS、WINDOWS、LINUX不同操作系统的电脑之间传播(即便电脑不连接网络也可被感染)。

附上几张截图:


 附件: 您所在的用户组无法下载或查看附件

 附件: 您所在的用户组无法下载或查看附件

 附件: 您所在的用户组无法下载或查看附件

 附件: 您所在的用户组无法下载或查看附件

 附件: 您所在的用户组无法下载或查看附件

用户系统信息:Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
最后编辑baohe 最后编辑于 2014-01-28 14:44:49
分享到:
gototop
 

回复:“武器级恶意程序”——瑞星拿到样本没?

猫叔~~~~~~!

娱乐区官方群——113762779,加入请注明论坛昵称  O(∩_∩)O点击惊现很多美女,很多贡献,很多滴欢乐O(∩_∩)O
神人到处有,茶馆特别多。谁让我开不成茶馆,我就让ta2012。在我二成一种传奇之后,再也不用羡慕其他人了。
gototop
 

回复 2F 茶馆小二 的帖子

2

刑满释放了?
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?

听说过据说卡巴可以拦截
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?

小二出来了!
没事我踩踩!
灌水是我的第一要义!顶贴是我的首要职责!
时令鲜果猕猴桃,有需要的私信我!
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?

依赖声音转换数据过去

有个问题呢

没毒的电脑的麦即使开着,难道接收到的音频能导致那电脑的声卡的某些驱动或程序漏洞执行音频内包含的代码

唬人呢
百年以后,你的墓碑旁 刻着的名字不是我
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?

它必须有个前提,就是对方电脑内已经有某个支持将此音频信息包含的数据解读为可执行代码才能传播的

显然这一步是不太可能了
百年以后,你的墓碑旁 刻着的名字不是我
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?

噢!!!!!!

再细看看

原来

深入调查分析发现,只有在移除内部扬声器和麦克风之后,抓包工具才发现不再有数据包传输。Ruiu指出,这个恶意程序能利用扬声器和麦克风在计算机之间进行高频传输。

原来是

badBIOS并不是利用扬声器麦克风传播病毒,而是通过麦克风在被感染机器之间进行通信,就像是彼此之间联网。
百年以后,你的墓碑旁 刻着的名字不是我
gototop
 

回复: “武器级恶意程序”badBIOS——瑞星拿到样本没?

  A number of readers have asked us, "What do you guys have to say about the BadBIOS story that's unfolding at the moment?"
  In a nutshell, it's a story about a virus that is claimed to have some remarkable characteristics.
  Sufficiently remarkable, in fact, to inspire Ars Technica's Dan Goodin to describe it as not just "mysterious" but "omnipotent."

  What it does
  Here are some of the claims that have been made about the BadBIOS virus:
  It is said to infect the low-level system firmware of your computer, so it can't be removed or disabled simply by rebooting.
  It is said to include components that work at the operating system level, so it affects the high-level operation of your computer, too.
  It is said to be multi-platform, affecting at least Windows, OS X, and OpenBSD systems.
  It is said to prevent infected systems being booted from CD drives.
  It is said to spread itself to new victim computers using Software Defined Radio (SDR) program code, even with all wireless hardware removed.
  It is said to spread itself to new victim computers using the speakers on an infected device to talk to the microphone on an uninfected one.
  It is said to infect simply by plugging in a USB key, with no other action required.
  It is said to infect the firmware on USB sticks.
  It is said to render USB sticks unusable if they aren't ejected cleanly; these sticks work properly again if inserted into an infected computer.
  It is said to use TTF (font) files, apparently in large numbers, as a vector when spreading.
  It is said to block access to Russian websites that deal with reflashing software.
  It is said to render any hardware used in researching the threat useless for further testing.
  It is said to have first been seen more than three years ago on a Macbook.
  By now, you may be thinking that this sounds more like a science fiction movie than real life.
  In fact, if you're a certain age, you may well be waiting for Jeff Goldblum to burst forth with a Mac, some mysterious and onmipotent file transfer software, and a countervirus that will save the planet.
  You're probably also thinking that with as many symptoms, twists, turns and apparent tell-tales as are listed above, we ought to know a lot about it after three years.
  The thing is, all the facts above come from one observer on Twitter, @dragosr, the guy who runs the CanSecWest, Eusec and PacSec security conferences.
  The abovementioned details have only come out in the past short while, so we can collectively be excused for not knowing an awful lot just yet.

  What we know
  One BIOS sample file has been made available; SophosLabs took a brief look and largely concurred with an already-public analysis published on Reddit. (For the record, our analysts didn't see the Reddit story until after they'd looked at the file.)
  The BIOS we saw seems all but identical to an official Dell Alienware BIOS, so it would be no use on a Mac, for example.
  And even if a byte-by-byte analysis of the whole BIOS were to reveal a pre-planted backdoor, that would nevertheless only be one small part of the whole story.
  Furthermore, the software defined radio and speaker-to-microphone infection vectors mentioned above, as a vehicle for jumping airgaps, sound highly speculative.
  Not impossible, of course - never say impossible where malware is concerned, not least since Stuxnet appeared - but certainly very unlikely.
  Spreading via USB sticks, like Stuxnet did, would surely be a satisfactory explanation on its own (though the part assuming automatic code execution via USB on multiple operating systems sounds highly speculative, too).
  Imagine that you could reliably get an infected system to beam out radio waves in the absence of any radio hardware, for example by relying on some serendipitously-located internal circuit parts to serve as your transmitter and antenna.
  Imagine that you could somehow turn on the speaker and produce reliably-decodable but inaudible sounds.
  How would you persuade the uninfected computer to receive them at all, let alone to treat them as shellcode that would ultimately let you reflash the BIOS?

  What to do about BadBIOS
  I don't think there is any need for alarm over the BadBIOS story.
  There isn't an obvious threat to everyone (like there was with Stuxnet, even before we knew its inner purpose); it doesn't seem to be spreading in the wild (like Stuxnet was, despite having a specific target); and there are plenty of clear and present threats we can usefully concern ourselves with in the interim.
  So that's about that for now, I'm afraid - it's a question of watching and waiting.
             
gototop
 

回复:“武器级恶意程序”badBIOS——瑞星拿到样本没?



如果听了声音就可以病了

那才可怕了
Hello! 我来过
gototop
 
12   1  /  2  页   跳转
页面顶部
Powered by Discuz!NT