Norwich IT
Articles News Reviews Releases Downloads Contact Us White Papers

Researchers: Rootkits headed for BIOS

Insider attacks and industrial espionage could become more stealthy by hiding malicious code in the core system functions available in a motherboard's flash memory, researchers said on Wednesday at the Black Hat Federal conference.

A collection of functions for power management, known as the Advanced Configuration and Power Interface (ACPI), has its own high-level interpreted language that could be used to code a rootkit and store key attack functions in the Basic Input/Output System (BIOS) in flash memory, according to John Heasman, principal security consultant for U.K.-based Next-Generation Security Software.

The researcher tested basic features, such as elevating privileges and reading physical memory, using malicious procedures that replaced legitimate functions stored in flash memory.


Read Full Story


News
Stinghorn Secure Business Suite
Tuesday, 7 February 2006 12:48 EST
Group Crafts Standards for Evaluating Outsourcers
Tuesday, 7 February 2006 12:16 EST
Locate almost anyone in the UK without their permission
Tuesday, 7 February 2006 12:14 EST
Using Rootkits to Defeat Digital Rights Management
Monday, 6 February 2006 17:50 EST
SteelEye LifeKeeper Protection for IBM Director
Monday, 6 February 2006 15:59 EST
Computer virus fells Russian stock exchange
Monday, 6 February 2006 14:48 EST
Study Notes Decline in Internet Spyware
Monday, 6 February 2006 14:43 EST




Site Meter