Jump to content
Posted 08 September 2010 - 06:03 AM
Posted 08 September 2010 - 05:51 PM
Edited by fgeelo, 08 September 2010 - 05:51 PM.
Posted 08 September 2010 - 07:41 PM
Posted 08 September 2010 - 07:46 PM
Edited by fgeelo, 08 September 2010 - 07:47 PM.
Posted 08 September 2010 - 07:58 PM
Posted 08 September 2010 - 08:57 PM
Edited by fgeelo, 08 September 2010 - 09:13 PM.
Posted 08 September 2010 - 09:31 PM
Even if we were to say our malicious exploiters would NEED the exact manufacturer, version and model of the BIOS Chip in your system, lets assume weíre in an extremely organized setup:
1) Malware can be created to create an outgoing connection once run on the victimís machine.
2)The malware identifies your machine and its components (specifically the BIOS model make and version)
3) The Malware executes a download to receive any components needed from here on out (Edited infected BIOS variants, auto-running scripts, you name it).
4) The Malware flashes the BIOS within the OS and triggers a reboot
Ė (Alternative) The Malware editís the boot order, triggers a reboot, the boot order allows it to flash right after post (possibly in itís own environment to silently install), reboots again to finalized
5) you are now the host of a very volitile infection.
Posted 08 September 2010 - 10:46 PM
Edited by fgeelo, 09 September 2010 - 07:25 AM.
0 members, 0 guests, 0 anonymous users