Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-... Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent. by Dan Goodin - Oct 31 2013, 3:07pm CET BLACK HAT HACKING Aurich Lawson / Thinkstock Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn't know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours. In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux. "We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since." In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations. Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities. "We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of the sudden the search function in the registry editor stopped working when we were using it to search for their keys." Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world's foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer's Basic Input/Output System (BIOS), Unified Extensible Firmware Interface (UEFI), and possibly other firmware standards, the malware can attack a wide variety of platforms, escape common forms of detection, and survive most attempts to eradicate it. But the story gets stranger still. In posts here, here, and here, Ruiu posited another theory that sounds like something from the screenplay of a post-apocalyptic movie: "badBIOS," as Ruiu dubbed the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps. Bigfoot in the age of the advanced persistent threat At times as I've reported this story, its outline has struck me as the stuff of urban legend, the advanced persistent threat equivalent of a Bigfoot sighting. Indeed, Ruiu has conceded that while several fellow security experts have assisted his investigation, none has peer reviewed his process or the tentative findings that he's beginning to draw. (A compilation of Ruiu's observations is here.) Also unexplained is why Ruiu would be on the receiving end of such an advanced and exotic attack. As a security professional, the organizer of the internationally renowned CanSecWest and PacSec conferences, and the founder of the Pwn2Own hacking competition, he is no doubt an attractive target to state-sponsored spies and financially motivated hackers. But he's no more attractive a target than hundreds or thousands of his peers, who have so far not reported the kind of odd phenomena that has afflicted Ruiu's computers and networks. In contrast to the skepticism that's common in the security and hacking cultures, Ruiu's peers have mostly responded with deep-seated concern and even fascination to his dispatches about badBIOS. "Everybody in security needs to follow @dragosr and watch his analysis of #badBIOS," Alex Stamos, one of the more trusted and sober security researchers, wrote in a tweet last week. Jeff Moss—the founder of the Defcon and Blackhat security conferences who in 2009 began advising Department of Homeland Security Secretary Janet Napolitano on matters of computer security—retweeted the statement and added: "No joke it's really serious." Plenty of others agree. "Dragos is definitely one of the good reliable guys, and I have never ever even remotely thought him dishonest," security researcher Arrigo Triulzi told Ars. "Nothing of what he describes is science fiction taken individually, but we have not seen it in the wild ever." Been there, done that Triulzi said he's seen plenty of firmware-targeting malware in the laboratory. A client of his once infected the UEFI-based BIOS of his Mac laptop as part of an experiment. Five years ago, Triulzi himself developed proof-of-concept malware that stealthily infected the network interface controllers that sit on a computer motherboard and provide the Ethernet jack that connects the machine to a network. His research built off of work by John Heasman that demonstrated how to plant hard-to-detect malware known as a rootkit in a computer's peripheral component interconnect, the Intel-developed connection that attaches hardware devices to a CPU. It's also possible to use high-frequency sounds broadcast over speakers to send network packets. Early networking standards used the technique, said security expert Rob Graham. Ultrasonic-based networking is also the subject of a great deal of research, including this project by scientists at MIT. Of course, it's one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But as Triulzi suggested, it's another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. What's more, use of a USB stick to infect an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran's nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet. "Really, everything Dragos reports is something that's easily within the capabilities of a lot of people," said Graham, who is CEO of penetration testing firm Errata Security. "I could, if I spent a year, write a BIOS that does everything Dragos said badBIOS is doing. To communicate over ultrahigh frequency sound waves between computers is really, really easy." Coincidentally, Italian newspapers this week reported that Russian spies attempted to monitor attendees of last month's G20 economic summit by giving them memory sticks and recharging cables programmed to intercept their communications. Eureka For most of the three years that Ruiu has been wrestling with badBIOS, its infection mechanism remained a mystery. A month or two ago, after buying a new computer, he noticed that it was almost immediately infected as soon as he plugged one of his USB drives into it. He soon theorized that infected computers have the ability to contaminate USB devices and vice versa. "The suspicion right now is there's some kind of buffer overflow in the way the BIOS is reading the drive itself, and they're reprogramming the flash controller to overflow the BIOS and then adding a section to the BIOS table," he explained. He still doesn't know if a USB stick was the initial infection trigger for his MacBook Air three years ago, or if the USB devices were infected only after they came into contact with his compromised machines, which he said now number between one and two dozen. He said he has been able to identify a variety of USB sticks that infect any computer they are plugged into. At next month's PacSec conference, Ruiu said he plans to get access to expensive USB analysis hardware that he hopes will provide new clues behind the infection mechanism. He said he suspects badBIOS is only the initial module of a multi-staged payload that has the ability to infect the Windows, Mac OS X, BSD, and Linux operating systems. Dragos Ruiu Julia Wolf "It's going out over the network to get something or it's going out to the USB key that it was infected from," he theorized. "That's also the conjecture of why it's not booting CDs. It's trying to keep its claws, as it were, on the machine. It doesn't want you to boot another OS it might not have code for." To put it another way, he said, badBIOS "is the tip of the warhead, as it were." “Things kept getting fixed” Ruiu said he arrived at the theory about badBIOS's high-frequency networking capability after observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed the internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. "The airgapped machine is acting like it's connected to the Internet," he said. "Most of the problems we were having is we were slightly disabling bits of the components of the system. It would not let us disable some things. Things kept getting fixed automatically as soon as we tried to break them. It was weird." It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. "It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was," Ruiu concluded in an interview. "The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers."
On 10/31/2013 01:23 PM, Eugen Leitl wrote:
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-...
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps
Robert Graham has published a well-written response: http://blog.erratasec.com/2013/10/badbios-features-explained.html -- Johnathan Corgan, Corgan Labs SDR Training and Development Services http://corganlabs.com
On Thu, Oct 31, 2013 at 4:56 PM, Johnathan Corgan <johnathan@corganlabs.com> wrote:
... Robert Graham has published a well-written response:
http://blog.erratasec.com/2013/10/badbios-features-explained.html
those who find this incredible* need to remember that Flame/Duqu style attacks (they are just one instance of a family of systems and programs) have been accelerating and improving since the mid aughts. the only thing i am surprised by is the lack of infection of mobile devices; this would be a logical and expected lateral transition or even infection vector; there is no mention (yet). the massive stockpile of weaponized 0days, covert exfiltration, and espionage infrastructure will come to light sooner or later. we've only begun to see the outline of what has been wrought with $billions applied over years by multiple actors... * some have confused the audio malware channel with audio as infection vector - this is not the case. from my reading the audio communication is occurring between infected systems, not a vector for initial infection. (now _that_ would be a feat ;)
--On Thursday, October 31, 2013 6:56 PM -0700 coderman <coderman@gmail.com> wrote:
from my reading the audio communication is occurring between infected systems, not a vector for initial infection. (now _that_ would be a feat ;)
the ars technica article is pretty sloppy isn't it? I got the impression that the author wanted people to believe that a clean machine could be infected through a microphone...
On Thu, Oct 31, 2013 at 6:56 PM, coderman <coderman@gmail.com> wrote:
... those who find this incredible* need to remember that Flame/Duqu style attacks (they are just one instance of a family of systems and programs) have been accelerating and improving since the mid aughts.
full disclosure is coming for the activities at DC19 and DC20. ? a fully automated exploitation system with runbooks from trivial to last month 0day? check. ? ssh 0day and pilfered certificate code signing? check. ? mobile baseband 0day and surreptitious infection? check. ?automated lateral infection cross platform, cross architecture, cross $whatever? check. some day in the near future we'll all get a look into the abyss. some will retreat into denial, crossing this off the threat model. others will rise to challenge; well played! now for my counter move...
coderman wrote:
* some have confused the audio malware channel with audio as infection vector - this is not the case.
If you whistle into the bluetooth sensor *just* right, you might be able to pull it off. Just remember you have to use one of those special whistles that come in boxes of BooBerry. ~Griffin -- Be kind, for everyone you meet is fighting a hard battle. PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97 OTR: saint@jabber.ccc.de
coderman wrote:
* some have confused the audio malware channel with audio as infection vector - this is not the case.
~Griffin replies:
If you whistle into the bluetooth sensor *just* right, you might be able to pull it off. Just remember you have to use one of those special whistles that come in boxes of BooBerry.
ok- myself the fool must speak again... imagine you have a secure facility, locked down, faraday caged, etc, and a freaking marching band starts playing outside the walls... what if this sound passed through the electromagnetic barrier that captures EM signals, and activates or accesses hidden hardware, computers within a computer, say a quantum network wakes up and starts to parse data in an unobservable way. that is, enough computing power to analyze and attain targeted data. and that in turn this data is relayed outwards via vibrations - resonating sequences, that exfiltrate data across enough sound bandwidth to dump everything in a short period of time. perhaps not Captain Crunch in an audio port, yet what of hidden audio channels or dual-use components that can function as a microphone or exist unseen, unobservable within the given software/hardware perspective of what can be and is monitored. whose to say or how to know that a particular MP3 playing nearby a computer is not capable of infecting it via a stream of hidden encoded data that could activate a switch or arm a hostile process. what if the security system monitoring things is somehow able to communicate across airgaps, or -- fuckit: ZOMBIES unconsciously programmed to make errors or mistakes that lead to security exploits, say bringing in the mp3 into proximity to the otherwise secure computer, something believed innocuous potentially, yet such an action cascading into an exploit beyond USB payloads. what components besides a speaker can also function as microphones (listening for signals), LEDs, perhaps FET or other devices as a signal surge or particular sequence could (if not like buffer overflow) function beyond known parameters. what if a resonating cavity exists inside the CPU like ethernet wake-on-LAN and knowing that whistle wakes up an alternative network and hidden functioning. that piccolo player outside the window could be a hacker yet outside the threat model. hypothetical and conspiracy, though what about non-electromagnetic dynamics also...
On Thu, Oct 31, 2013 at 8:31 PM, brian carroll <electromagnetize@gmail.com> wrote:
... imagine you have a secure facility, locked down, faraday caged, etc, and a freaking marching band starts playing outside the walls...
what if this sound passed through the electromagnetic barrier that captures EM signals, and activates or accesses hidden hardware,
SCIF's are acoustically shielded, but as we know, bass carries ;P
perhaps not Captain Crunch in an audio port, yet what of hidden audio channels or dual-use components
you've now mapped an unknown infiltrated target to physical location. win!
... what if the security system monitoring things is somehow able to communicate across airgaps, or -- fuckit: ZOMBIES unconsciously programmed to make errors or mistakes that lead to security exploits, ... cascading into an exploit beyond USB payloads.
the human factor always most vulnerable and most effective. the zombies have been trained to adhere to procedure and tactics! you just need to trigger the elicited response accordingly...
what components besides a speaker can also function as microphones
you're asking what can function as covert channel. the good new, or bad new, as it may be, is nearly _anything_!
hypothetical and conspiracy, though what about non-electromagnetic dynamics also...
Brian this is where your non-conventional, non-indoctrinated, non-canonical thinking is particularly adept and useful. "think outside the box" say all those who can longer do so. keep it up; your inquiries and suppositions more accurate than you even realize... we got no treats this year, i think it's beyond time for tricks!
thanks for sharing your insight, coderman. i have an additional comment on a single point... perhaps i misunderstand it, though must 'resonance' be audibly acoustic, and would a SCIF actually defend against "vibrations" at all frequencies. what is referenced is the pairing of vibration in resonance, fundamental to quantum physics if not mistaken, whereby two identical entities can vibrate in unison, at a distance, to include at opposite ends of the universe, seemingly so if this were involved, not necessarily sending human audible soundwaves, though that sympathetic vibration (as one string vibrating influences another, say) or other (wireless power of Tesla, though i do not know enough to make the case) could potentially function beyond a SCIF barrier or wall. for instance, if having a tuning fork on the inside and a tone naturally generated else also electromagnetically sustained on outside of the SCIF, such that a vibration or specifically paired resonating condition would under normal circumstances exist, vibrations causing other vibrations -- though while inaudible or outside normal hearing ranges, is it by default true that a SCIF kills off that paired vibration, else would not quantum effects cease to exist in the materials (atoms, molecules, particles) inside of the SCIF and have the power to detach them structurally from space-time even. i tend to think the tuning fork would vibrate inside the SCIF moreso than not, if it is explored beyond ordinary channels. just a guess. perhaps though because i do not actually have any actual knowledge of these things, nor the science in its depth or breadth, that this is readily taken care of and accounted for in a security context. either way it would not be surprising to me, that such conceptual gaps may exist in auditing or they may be undocumented yet accounted for.
i wrote:
perhaps i misunderstand it, though must 'resonance' be audibly acoustic, and would a SCIF actually defend against "vibrations" at all frequencies.
actually need to add, regarding possibilities of entanglement how a device could be entangled prior to secure situation, though also, how workers could be entangled in functionality beyond SCIF and potentially go back outside with data that is entangled or can be read from modified patterning, this perhaps an entropy/RNG issue of determining hidden structure or weakening it, via repeated interactions. it is the 'cat in the box' situation, to model Schroedinger can occur only when the cat is in the box, to query 'health' (secure/insecure) though if cat is entangled before placed in box, entangled external relations can be diagnostic and used to determine its state remotely (akin to informational resonance as entanglement is my naive understanding). therefore, what of computing equipment entangled this way, secretly, or even people knowingly or unknowingly such that it is or is not accounted for in threat modeling. my guess is that in the ordinary day-to-day the quantum dimensions are wide-open for exploitation, exfiltration, etc including in basic activites, people operating equipment, where code and patterns exist/extend beyond machinery (whose to say a computer and persons EM waves are not by default entangled and carrying some information about pairing, protocols, influence, readable as structure; that is: neurology or physiology related to security audits, as with quantum physicists to evaluate such parameters)
i must have recursion disease...
my guess is that in the ordinary day-to-day the quantum dimensions are wide-open for exploitation, exfiltration, etc including in basic activites, people operating equipment, where code and patterns exist/extend beyond machinery
(whose to say a computer and persons EM waves are not by default entangled and carrying some information about pairing, protocols, influence, readable as structure; that is: neurology or physiology related to security audits, as with quantum physicists to evaluate such parameters)
basically, the potential for: HUMAN TEMPEST reading signals off the nervous system to potentially correlate this with EMF emissions of equipment, diagnostically. however unlikely, under certain conditions could data be gleaned this way, say if a modulated tone imprinted itself onto a brainwave or body field and could provide information about environment interactions then to imagine a robot or android able to siphon data this way, if listening to CPU or other equipment, frequencies, modulations (if recording or through mimicry) or whatever. the possibility of it. though if observed by another there would be no perceived threat, other than what is input and output via the monitored channels okay, certifiably nuts. though in a realm of possibility or within particular parameters could it exist as a threat or exploit, etc. akin perhaps to reading lines-of-force for navigation by birds, what if 'sensing' of computing equipment could glean data as if a TSCM review of data structure, yet not visibly indicate this, and for the purpose of attacks or espionage not its defense too blade-runneresque, yet with biometrics and the rest, at what point does a security threat model peak or go beyond what is discussed to address the sci-fi potentials involved, and answering this with, whatever it is: it remains classified
SCIF's are acoustically shielded, but as we know, bass carries ;P
This has been demonstrated critically... https://www.youtube.com/watch?v=LtIj1Sndcc8 https://www.youtube.com/watch?v=pthHmI5e7eU https://www.youtube.com/watch?v=dJnU9YKoLWA Unlikely the average laptop would adequately cover the airgap in this frequency range. Signal to noise ratio and packet loss are further inhibitive to data transmission.
participants (7)
-
brian carroll
-
coderman
-
Eugen Leitl
-
grarpamp
-
Griffin Boyce
-
Johnathan Corgan
-
Juan Garofalo