New vicious UEFI bootkit vuln found for Windows 8

Discussion in 'other security issues & news' started by lotuseclat79, Sep 24, 2012.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,091
    New vicious UEFI bootkit vuln found for Windows 8.

    -- Tom
     
  2. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,148
    Fun stuff.
     
  3. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,721
    Location:
    Texas
  4. guest

    guest Guest

    Imagine that o_O o_O o_O

    Now maybe everyone will quit bragging about the uncrackable Windows 7 & 8
     
    Last edited by a moderator: Sep 24, 2012
  5. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,317
    Location:
    AmstelodamUM
    "The UEFI platform will soon become the new field of war between malware writers and the security industry unless SecureBoot is used to ensure that only digitally signed UEFI bootloaders can be executed at the system bootup." (from the above El Reg link)
    If UEFI replaces the BIOS and MBR, couldn't I have some low-tech $0.001 UEFI ultra-super-supreme-secure jumpers. The same ones that allowed me to yawn when regarding BIOS malware?

    Anyone with UEFI/hardware knowledge who can point out/offer some links why that's a stupid perception on my part? Or perhaps not?
     
  6. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,148
    I think the issue here is that UEFI is more complex than BIOS and you can write in C, which is a hell of a lot easier than ASM. The combination just makes it a bit easier to target.

    Overall SecureBoot is going to prevent a lot more malware than it allows in my opinion.

    @Baserk,

    There's no jumper to replace the MBR. You'd need some kinda LiveCD. If malware has control over your bootloader you may not be able to get on one, I don't know.
     
  7. funkydude

    funkydude Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    6,851
    Firstly, this has already been posted in the "Norton scaring Windows 8 users" thread.

    Secondly, this is complete and utter sensational garbage, quite simply because secure boot was DISABLED. Having secure boot DISABLED means you might as well run a system with BIOS. The whole sensationalist part about targeting Windows 8 is complete nonsense, if Windows 8 OEMs want their PCs to be certified (which they will) they will HAVE to ship with Secure Boot turned ON.

    Thirdly, what's with the "lagging behind OS X"? What does UEFI have to do with the OS? Not only that, but they specifically mention in their own article:

    I don't see any mention of a vulnerability or exploit being used in the original article.
     
  8. ComputerSaysNo

    ComputerSaysNo Registered Member

    Joined:
    Aug 9, 2012
    Posts:
    1,413
    The problem I see is faked certificates. FYI it costs $75 to get a sedcureboot certificate from MS. I can see malware authors exploiting this system due to the fact it's certificate based. Fake one or impersonate one and you own the system and you can load your rootkit.

    Look what happened with Realteak and stuxnet, faked signed driver and BOOM infected.
     
    Last edited: Sep 26, 2012
Loading...
Thread Status:
Not open for further replies.