Moonbounce is a persistent malware that can survive drive formats and OS reinstalls

Discussion in 'malware problems & news' started by stapp, Jan 26, 2022.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    27,166
    Location:
    UK
    https://www.ghacks.net/2022/01/25/m...-can-survive-drive-formats-and-os-reinstalls/
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,258
    Location:
    .
    Ok but how Moonbounce gets in the PC in the first place?
     
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
  4. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,258
    Location:
    .
    Apparently this bootkit attacks UEFI firmware only, not BIOS systems.
    If so, I'm safe for now.
     
  5. aztony

    aztony Registered Member

    Joined:
    Sep 9, 2012
    Posts:
    773
    Location:
    The Valley Arizona
    So legacy BIOS presumably is, so far, seemingly immune. But for how long??
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
  7. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    Enabling Secure boot and/or adding a password to access UEFI should prevent this, according to the article.
     
  8. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,258
    Location:
    .
    I see in those articles some tools to monitor and protect firmware integrity in hardware but they're for enterprises. Hence quite expensive.

    How about, for the average home user, to re-flash the UEFI/BIOS firmware regularly. Just in case.
     
  9. Freki123

    Freki123 Registered Member

    Joined:
    Jan 20, 2015
    Posts:
    337
    If you are not special (like state targeted) I would just use a secure boot and a bios/uefi password. A firmware flash can always go wrong and some mainboards don't have a backup bios. I wouldn't want to force my "flashing" luck :D
     
  10. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    9,147
    Location:
    USA
    Agreed. Not something I would do just as preventative security. I had a PC in the past that would fail to finish a flash. Fortunately I was able to buy a chip that was already flashed with the correct firmware. After I paid for that and the tool to extract the old one it still wasn't cheap despite that the entire machine would have been bricked had I not had that option.
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    I assume you first still need to run malware before it can infect the UEFI. So either the user needs to run it, or they can use some exploit to run the malware automatically. But if this is the case, it's not clear to me how AV's can block it from infecting the UEFI. With normal rootkits it's enough to simply block a driver from loading.

     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.