LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-01-2013, 06:43 PM   #1
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Rep: Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694
Ignore reports of "badbios"


Im not sure how this article passed any quality control checks or editors, but bausically its just complete bullshit. Spend your time worrying about real threats that exist, not this drivel.

(There is no virus that will infect a compter that is unplugged. And no such thing as a virus that will spread from speaker to microphone.)

arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps
 
Old 11-01-2013, 07:00 PM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,334

Rep: Reputation: Disabled
In defense of the article, it doesn't actually say that the virus can infect an airgapped computer, just that the malware in question is able to spread via USB devices, and that infected computers may be able to communicate via ultrasonic sound waves.

The evidence for the ultrasonic communication far from solid. The security researcher in question claims to have observed two unplugged, infected computers (without WiFi or Bluetooth) in close proximity communicating until he unplugged the microphone. So why didn't he simply record the supposed ultrasonic sounds and slow the recording down to shift the frequencies into the audible range?

A sensationalist article for sure, but not quite as far-fetched as the initial reports from other media suggested.
 
Old 11-02-2013, 12:52 PM   #3
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Original Poster
Rep: Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694
The title of the article is "malware that jumps airgaps," so I'd have to disagree with your first statement.

And if you didn't read that part, I'm almost certain you didn't read farther into the article. But I'm certainly not suggesting you waste any of your time doing so. None of it has any basis in reality.
 
Old 11-02-2013, 08:17 PM   #4
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,334

Rep: Reputation: Disabled
I have of course read the entire article carefully. The "airgap jumping" refers to communication between already infected nodes, not a mechanism used by the virus for infecting new hosts.

The security researcher reporting this malware is not some random nobody. He could still be wrong, but nothing in the report is straight-out impossible, just unlikely for your average, garden-variety malware.

The malware in question (assuming it exists) would have to be vastly more complex than the viruses or trojans infecting the average Windows PC, but we've already seen malware with extremely complex payloads (Stuxnet) and advanced mechanisms for spreading from one host to another.
 
Old 11-03-2013, 04:25 AM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by szboardstretcher View Post
Im not sure how this article passed any quality control checks or editors, but bausically its just complete bullshit.
While the article itself certainly has a ring to it reminiscent of spy novels and doesn't reveal much in terms of actual facts I wonder what facts you based your ace assessment on? If you've never done that kind / level of auditing / forensics then what is your opinion actually worth?..
 
Old 11-03-2013, 07:51 AM   #6
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
I think the "jumping airgaps" thing should never have got past the editor. It's an appalling insinuation that machines can be infected using something like ultrasonic communication that is only clarified by weak inferences in the article. One could easily read that article and still come away thinking they were talking about infection by ultrasound and that, in my opinion, shows the editor up as not qualified to do the job they are in.
As for the content when translated from sensationalist bull double-speak I find some of it vaguely plausible but tend towards the opinion that somebody in the lab is deliberately infecting machines once they've been cleaned. I always go for the "simplest is usually the case" explanations and would, in tihs case, be looking for an insider with a grudge.
 
1 members found this post helpful.
Old 11-04-2013, 07:38 AM   #7
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Original Poster
Rep: Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694
One "fact" I based my assessment on is that no one will ever give a virus "over an airgap" to a computer that has its power cord unplugged.

Well, in "Hackerz" the movie, or "The Net" maybe its possible. But in the real world this isn't possible.

Read 273's post above this one for a much better explanation.

Last edited by szboardstretcher; 11-04-2013 at 08:00 AM.
 
Old 11-04-2013, 01:31 PM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
One thing forensics has taught me is that it is too easy to miss evidence based on assumptions and too easy to taint evidence by not being thorough enough. That's why old timers in this forum often remind people to base things on facts and facts alone. What is clear is that nobody talking about it on the 'net has all the facts the "victim" seems to possess. And without those only conjecture remains.
 
Old 11-04-2013, 05:00 PM   #9
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,642
Blog Entries: 4

Rep: Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933Reputation: 3933
I sense at least a #CLASSIFIED#-Million Dollar ##CLASSIFIED## Military Contract here ... ...

Hey, all I actually need to do is "to convince Representative So-And-So from California, who is up for re-election," that "(s)he will gainfully employ #CLASSIFIED# Registered Voters from his/her District" in the "#CLASSIFIED#-Million Dollar Contract" to Certify Every One of the US Government's Homeland-Security ("nine-wun-wun! nine-wun-wun! nine-wun-wun!") Systems are immune to This Imagined Threat!

"Don't laugh" ... because I'm not.

'So-and-so' gets re-elected ... and meanwhile, I walk away with #CLASSIFIED# #CLASSIFIED#ions of Dollars! (So, who came out ahead? "Yep! You gue$$ed it!")

Last edited by sundialsvcs; 11-04-2013 at 05:03 PM.
 
Old 11-05-2013, 07:47 AM   #10
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Original Poster
Rep: Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694
Quote:
Originally Posted by unSpawn View Post
One thing forensics has taught me is that it is too easy to miss evidence based on assumptions and too easy to taint evidence by not being thorough enough. That's why old timers in this forum often remind people to base things on facts and facts alone. What is clear is that nobody talking about it on the 'net has all the facts the "victim" seems to possess. And without those only conjecture remains.
But this: "Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords ... were removed" is not true in any way, and that is not conjecture on my part. It is a fact of our reality.

At least it is my opinion that it is.

Last edited by szboardstretcher; 11-05-2013 at 07:52 AM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
"posts with 0 replies" search to ignore member intro forum? ror LQ Suggestions & Feedback 4 10-10-2014 09:54 PM
how can I "cat" or "grep" a file to ignore lines starting with "#" ??? callagga Linux - Newbie 7 08-16-2013 06:58 AM
Calling emacs experts: Can indentation ignore extern "C" { .. }? JohnGraham Programming 4 08-01-2011 03:29 PM
fdisk reports odd "Start "and "End" sectors on single partition eponymous Linux - Software 3 10-01-2007 03:41 PM
why is the default to fsck's "ignore error" "yes"? leftPeg Linux - Software 3 02-20-2006 02:02 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:02 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration