Get Help Now
    24/7 Support

    Rootkits of BIOS

    In 2009, a study was conducted which is boot sector based rootkits. Developments in this area have led to what has been developed and released a “Bootkit”. Despite the comments and suggestions that this bootkit code could be moved into the BIOS for execution, there have not yet been any examples of such code made public. The authors of the work on Persistent BIOS Infection found that VMware includes ROM BIOS, and the GDB server, which can be used for debugging applications, starting with the BIOS. After all successfully VMware continues, the work was done in the BIOS modification VMware other similar port BIOS.

     

    In the course of this project, the author conducted tests on the physical PC. A process that has been used:

    1. Insert a new challenge at the beginning of the module decompression our additional code.
    2. Copy all of our extra code into a new section of memory.
    3. Update call decompression module to point to the new location in memory where our code.
    4. Go back to the decompression unit and continue execution.

     

    This project has shown that the BIOS rootkit was portable enough to work on multiple systems (VMware, the HP laptop).

     

     

    More.



    DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.