The New BIOS Hack That Bypasses Every Antivirus

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 ธ.ค. 2024

ความคิดเห็น • 1.9K

  • @ThioJoe
    @ThioJoe  9 หลายเดือนก่อน +105

    Sponsored: Stop data brokers from exposing your personal information. 😤 Go to aura.com/thiojoe to get a 14-day free trial and see how much of yours is being sold.

    • @tyroniebalonie
      @tyroniebalonie 9 หลายเดือนก่อน +4

      What if your motherboard has dual uefi? Couldnt I just switch my uefi if one of them got compromised or does this infect both?

    • @AWIRE_onpc
      @AWIRE_onpc 9 หลายเดือนก่อน +4

      no

    • @zenvio
      @zenvio 9 หลายเดือนก่อน +1

      ew no

    • @scrappychildhood6633
      @scrappychildhood6633 9 หลายเดือนก่อน +1

      Would not be Suprised if DARPA and other 3 letter agenices i won't mention had this for decades yet somehow got in bad hands

    • @envyy_valo
      @envyy_valo 9 หลายเดือนก่อน

      ok (:

  • @joaquingomezullrich878
    @joaquingomezullrich878 9 หลายเดือนก่อน +1507

    All of the firmware level malware could be solved by just putting a physical write enable jumper on the motherboard. The EEPROM is read-only by default, if you want to flash the chip, you just move the jumper and reset it when you're done. It's not like you're updating the UEFI/BIOS every week

    • @AmberFoxxo
      @AmberFoxxo 9 หลายเดือนก่อน +150

      Yeah, why isn't this standard yet? Would love this on hard drives too

    • @marenjones6665
      @marenjones6665 9 หลายเดือนก่อน +386

      1) pretty sure this used to be a thing
      2) laptops aren't designed to be opened
      3) companies want us to be fully reliant on them for all services, so anything that straightforward is anathema to them. 😢

    • @futuza
      @futuza 9 หลายเดือนก่อน +58

      Yes, I dunno why they don't just do this with UEFI. They basically used to back in BIOS land. It'd be nice to have this option for ssds as well

    • @marenjones6665
      @marenjones6665 9 หลายเดือนก่อน +75

      What I loved was an old mobo back in my Vista days (yes, laugh at me) that had tiny switches on it, like lightswitches, instead of jumpers. Flip swich, flash bios, flip switch back. No chance of mangling a jumper with my very clumsy fingers, no chance of dropping it in the carpet to be forever lost. Don't know why those never caught on.

    • @TheRealScooterGuy
      @TheRealScooterGuy 9 หลายเดือนก่อน

      @@marenjones6665 -- Power users loved them. But penny pinching took over manufacturing. EVERY penny matters when making millions of some item.

  • @totalchaos1976
    @totalchaos1976 9 หลายเดือนก่อน +917

    this is why it should be read only until a jumper is changed like the old days

    • @n.lightnin8298
      @n.lightnin8298 9 หลายเดือนก่อน +30

      Underrated comment

    • @Ether_Void
      @Ether_Void 9 หลายเดือนก่อน +23

      The attack would however still work with a logo stored on the EFI partition or NVRAM.
      Often NVRam and EEPROM are combined into a single flash chip in which case making it read-only wouldn't work.
      Also other parts of the firmware like intel microcode, USB/Thunderbold peripherals etc. can have security issues which would be baked into the motherboard after shipping. It's basically a 'pick your poison' type of situation.

    • @locklear308
      @locklear308 9 หลายเดือนก่อน +13

      *OEM's having 500 strokes per second at the thought*

    • @xmaniac99
      @xmaniac99 9 หลายเดือนก่อน +1

      Very practical solutions when you have edge boxes in the middle of nowhere and you need to remote flash.

    • @Ihavelostallporpuse
      @Ihavelostallporpuse 9 หลายเดือนก่อน +4

      Most UEFIs store the settings on a flash chip, so if you make it Read only you couldn't change settings.

  • @fritz46
    @fritz46 9 หลายเดือนก่อน +865

    Being able to change the logo is so important that it is well worth adding security issues to implement that feature we all have been waiting for since 1981. Too bad my 10 year old computer is so fast that I never see the logo because it boots faster than the time the monitor needs to show an image after detecting the video signal.

    • @monad_tcp
      @monad_tcp 9 หลายเดือนก่อน +61

      the irony

    • @Oweblow
      @Oweblow 9 หลายเดือนก่อน +12

      Samesies.

    • @Blinkerd00d
      @Blinkerd00d 9 หลายเดือนก่อน +24

      That's why I haven't messed with splash screen images in so long. My work assigned laptop is the only one I ever see the logo on anyway.

    • @MassDamage1337
      @MassDamage1337 9 หลายเดือนก่อน +32

      you can change that, in BIOS you can set a delay so it waits before loading into windows. This is useful so you have a chance to get into BIOS instead of mashing "del".

    • @peterdobson3435
      @peterdobson3435 9 หลายเดือนก่อน +16

      Why do you think that changing the logo is important? End user isn't usually interested in branding.

  • @ricardolmendes
    @ricardolmendes 9 หลายเดือนก่อน +704

    You forgot to mention another way to protect this attack from working if your UEFI has the option to disable the boot logo. Disabling it will effectively eliminate this attack vector. This is specially useful for older motherboards that will never get a proper bios update to tackle this issue.

    • @Darkk6969
      @Darkk6969 9 หลายเดือนก่อน +38

      Good tip. Quick and easy to do.

    • @AccessRealty-p7k
      @AccessRealty-p7k 9 หลายเดือนก่อน +13

      How do you disable the UEFI ?
      Thank you 😊

    • @ricardolmendes
      @ricardolmendes 9 หลายเดือนก่อน

      @@AccessRealty-p7k on most non-corporate desktop motherboards you have the option to disable the boot logo on the boot section of the UEFI menu. Some laptops (specially gaming brands) also have this option.

    • @Yezpahr
      @Yezpahr 9 หลายเดือนก่อน

      @@AccessRealty-p7k It's not the UEFI you disable, but the boot logo. First get into the UEFI/Bios by tapping F2 while the computer starts or maybe it's a different key for you. It's also possible access to the Bios was disabled if you bought it from an overly eager computer store.

    • @pafik_
      @pafik_ 9 หลายเดือนก่อน +68

      Well, my older computer doesn't even have an UEFI so it don't support the virus at all 😂

  • @SteelRatVT
    @SteelRatVT 9 หลายเดือนก่อน +104

    I updated my BIOS today, before watching this video.
    Now that I look back to it, it does list "Addresses potential UEFI vulnerabilities (LogoFAIL)" as one of the notes.

    • @jjjjulian
      @jjjjulian 8 หลายเดือนก่อน +6

      HELL NAW

  • @trens1005
    @trens1005 9 หลายเดือนก่อน +32

    My thesis from 2012 is now in fruition. Thanks for this share gonna send this video to a few of people.

  • @melsbacksfriend
    @melsbacksfriend 9 หลายเดือนก่อน +205

    Two things:
    1: Isn't Intel boot guard only for Intel? What about AMD users?
    2: Can't you just reflash the stock bios to remove the virus?

    • @hentosama
      @hentosama 9 หลายเดือนก่อน +49

      Yes, and Mobo manufacturers already released fix for most models as new bios revisions

    • @monad_tcp
      @monad_tcp 9 หลายเดือนก่อน +34

      lol, intel boot guard, then your amazing motherboard manufacturer uses the same NVRAM for both the intel firmware where the boot guard resides and everything else. To save costs.
      They also forget to segment write protection in the NVRAM.
      AMD has the same problem.
      You can reflash the stock bios but that requires tools because the motherboard manufacturers don't usually even provide a pin header for easily connecting the flashing equipment to the NVRAM. So you might even end up needing to desolder the stupid microchip to flash it.
      That's if you aren't an unlucky notebook consumer whose manufacturer decided an external NVRAM was too costly and just embedded it in the SoC, then that computer is basically trash, unless they enable you to use JTAG on the SoC, which they usually don't.
      I wonder why PCs can't be easily JTAGged like smartphones can (well, the ones which aren't that fruit company). It should be a requirement for manufacturers to provide pin headers to easily flash the NVRAM.

    • @b4ttlemast0r
      @b4ttlemast0r 9 หลายเดือนก่อน +14

      @@monad_tcp many motherboards include a bios flash feature that as far as I know doesn't even need to execute an existing bios to work (I assume they have some dedicated hardware just for this feature), so shouldn't that always be able to reflash the bios?

    • @killertruth186
      @killertruth186 9 หลายเดือนก่อน +1

      @@monad_tcp And very few motherboards have flashback like Asus does for some of their motherboards.

    • @tablettablete186
      @tablettablete186 9 หลายเดือนก่อน +3

      2. Probably not, since the malware could simply disallow any updates

  • @BxOxSxS
    @BxOxSxS 9 หลายเดือนก่อน +85

    3:12 This is not true (entirely). Secure boot is not designed to verify bios. It's for verifying efi binaries and OpROMs (uefi fimrware in external devices like dGPU). Veryfing bios is possible by verifying digital signature when trying to update it (by running version of bios). It's not standardized through as far I know

    • @jwhite5008
      @jwhite5008 9 หลายเดือนก่อน +2

      Yes, it cannot read or even know of what is happening in ring-minus-whatever by design.
      there is a lot of code by different manufacturers and sources which runs absolutely stealthily, uncheckable by AVs, and some of it gets hacked once in a while.
      x86_64 is a mess of corporate backdoors, and there is no fixing it since that functionality is packaged by Intel/AMD and required for CPU to even function at all, same with basic firmware functions that the computer cannot possibly work without.

    • @BxOxSxS
      @BxOxSxS 9 หลายเดือนก่อน +3

      @@jwhite5008 Looks like you have not heard about coreboot. It can disable ME/PSP. Or by using other vulnerabilities modify their firmware. It would also ofc involve reverse engineering. Very hard but not impossible as you said

    • @SLLabsKamilion
      @SLLabsKamilion 8 หลายเดือนก่อน +3

      ​@@BxOxSxS Uh, no, nononononono. PSP cannot be disabled or bypassed. It is *the* root of trust during initial bringup, responsible for reading the rest of AGESA from SPI NOR, ranging the DDR links, and copying the UEFI firmware capsule from SPI NOR into DDR memory. The x64 cores are held in reset until this point. PSP and SMU are both simple ARM cores, and can (and do) check and validate the signatures while loading the objects out of NOR. Once the x64 cores are freed and the UEFI firmware begins to start, is where coreboot has a chance to slip in (but only on certain amd-and-google-signed chromebook platforms) and handle responding analogously to the UEFI capsule. The PSP communicates through a shared memory mailbox with a doorbell flag. Very early AGESA versions simply told the PSP to go to sleep until the next full powercycle, which corresponds to the "PSP_DISABLE" option seen in some AM4 boards' CBS settings setup menu. Newer versions make use of the PSP during runtime to handle memory region encryption, being responsible for setting up the keys used for SME zones (from memory, up to sixteen.) and no longer responds to the "PSP_DISABLE" message.
      It *IS* possible, as you speculate, to mix and match some aspects of the AGESA firmware directory, and send the PSP to sleep, change the mailbox address, or doorbell id, resulting in ignoring further messaging in the firmware, but a linux kernel will rediscover the mailbox and try to set it up for SME (with all zero keys, effectively disabling it) during kernel boot.
      LogoFail and Boothole both rely on the fact that the firmware contains an actual directory listing section.
      And we're not even getting into SMBIOS exports or SMM handlers in ACPI tables, or the nastiness that lets platform vendors embed whole PE segments for windows to blindly nod and run during every boot. (Lenovo, i'm looking straight at you.) -- that's partially what jwhite5008 was on about.
      ME is a different story altogether, based on it's generation. You're mostly correct in your assertation above, in it's case. As it's a completely sidecar processor like a BMC, and does not control anything about intel's early bringup, it can be pruned in a number of ways, from the easy (delete it's firmware sections entirely) to the tinfoilhat (use the 'poorly/discretely documented' disable mode that exists because the NSA demanded a way to turn ME off, aka "High Assurance" mode ((LOL!!))) to the massively paranoid "I'm replacing my SPI NOR flash part with a smaller device so the ME section is incapable of being reflashed upon my hardware as it no longer fits".
      Plus the forks like oreboot and HEADS and stuff to run on it like tails and qubes...
      I'm not this paranoid myself but I figured I should understand what the fuss was about before pointing fingers at glass houses and declaring that emperor has no clothes on.

    • @fireteamomega2343
      @fireteamomega2343 7 หลายเดือนก่อน

      Yes you could hash check versions like most secure firmware does

  • @samuelld1
    @samuelld1 9 หลายเดือนก่อน +60

    Thanks for keeping us well informed❤

  • @1mwls
    @1mwls 9 หลายเดือนก่อน +36

    Thanks, I just updated the BIOS. HP had an update dated a week ago. I'm 63 and that's a scary update to do, But it only took a few minutes.

    • @ReyNico
      @ReyNico 7 หลายเดือนก่อน +1

      Hell yeah ✊🏽✊🏽

    • @sazerchu
      @sazerchu 6 หลายเดือนก่อน +1

      as long as you are careful and prepare well updating a bios is fairy straight forward. HP is a bit of a pain though because you can only do it via a windows executable script that isnt "expandable".
      I just had a HP laptop with "Optima" tech that died bad. Took the better half of 2 days to fix it. Wondering if this was the exploit used on it as the owner is an outspoken Chaldean who trolls the "middle eastern" PalTalk community...

  • @accountname7738
    @accountname7738 9 หลายเดือนก่อน +209

    My motherboard manufacturer hasn't relased an update in the past 3 years. Wonderful! :)

    • @Rairosu
      @Rairosu 9 หลายเดือนก่อน +11

      Yea my Gigabyte Z170X ultra Gaming Motherboard is dinosur age old. The only update it had was the microcode in 2018. That was it. I have that update but HIGHLY doubt they will update mines again.

    • @kolz4ever1980
      @kolz4ever1980 9 หลายเดือนก่อน +6

      time to update that relic you're pretending is a pc ;)

    • @sazerchu
      @sazerchu 6 หลายเดือนก่อน

      @@kolz4ever1980 and if you can't afford another one right now (as Im on ODSP and barely able to eat as it is with less than a dollar to save a month)? I have an ASUS Z170 chipset board too that was donated to me (no code updates for this yet...) Its to replace a GB Z68X board I've had since 2011...

    • @joaoborgesrodriguesalves6554
      @joaoborgesrodriguesalves6554 6 หลายเดือนก่อน +1

      Dont listen to that other guy,your pc is wonderful without any uodates whatsoever

    • @kolz4ever1980
      @kolz4ever1980 6 หลายเดือนก่อน

      @@joaoborgesrodriguesalves6554 😆 when did care bear bitching for out dated PCs that are ages old become a thing?

  • @OmegaBlack999
    @OmegaBlack999 9 หลายเดือนก่อน +46

    I'm one of those that always keeps my bios and other firmware updated to the latest versions. However, I often wait a week or two to watch for complaints of stuff breaking before installing, lol.
    Thanks again for another awesome bit of news. We love you for always looking out for us and also for all the cool stuff you show us.

    • @ArdaSReal
      @ArdaSReal 5 หลายเดือนก่อน +1

      @@OmegaBlack999 id like to wait just to be safe but i just have this itch knowing im on outdated software i update immediately(i also just enjoy messing with my pc even if its just a bios update) but I havent been a PC gamer for long, do bad bios updates really happen regularly?

    • @OmegaBlack999
      @OmegaBlack999 5 หลายเดือนก่อน

      @@ArdaSReal bad BIOS updates don't happen all of the time. It's just a really big deal when it does bc it can brick your mobo, or create a vulnerability, or cause instability, or performance reductions if something is just a little off.
      Updating your BIOS is generally a great thing, though, giving your mobo increased stability and compatibility with higher frequency RAM and more stable clocks, higher performance, etc.
      I always update all my drivers, again, I just usually wait a week or two to watch for potentially negative effects to be corrected or diagnosed, even though they are rare.

  • @DynamixWarePro
    @DynamixWarePro 9 หลายเดือนก่อน +189

    Someone I knew in the late 2000s who was a very good programmer, told me that he had made a virus that wouldn't let you start your computer and basically bricked it. He said what it did, when you turned on the computer, you would see the startup logo screen/BIOS and then the computer would just turn off, preventing you using the computer at all. I had no idea if he actually did make it or not but it sounds something very similar to what you are mentioning with this malware hack.

    • @AnFunctionArray
      @AnFunctionArray 9 หลายเดือนก่อน +32

      Except back then there was no UEFI but yeah otherwise something familliar except how can a logo br malicious is another question

    • @monad_tcp
      @monad_tcp 9 หลายเดือนก่อน +37

      @@cutekittypetter it was not a close kept secret, the infamous chernobyl did that way back in the day, it was easier back them to have access to the hardware because WindowsXP was a swiss cheese and there was less diversity in the way the BIOS could be written.
      But even later, It would be possible to still do that attack but it would be expensive as it would require customization for every motherboard type and manufacturer as they now are the weak point as they made the hardware more resilient to cheap attacks, now their software is the weak link, you basically just need to find a way to do what their update driver does.

    • @Logic44
      @Logic44 9 หลายเดือนก่อน +9

      The feds are gonna knock on your door now lmao

    • @cutekittypetter
      @cutekittypetter 9 หลายเดือนก่อน +2

      @@monad_tcp oooooh u right

    • @tylern6420
      @tylern6420 9 หลายเดือนก่อน +2

      ​@@monad_tcp wouldnt it be easier to just fabricate a short by connecting some pins with solder or something?

  • @SebinNyshkim
    @SebinNyshkim 9 หลายเดือนก่อน +20

    6:50 Secure Boot does NOT protect the EFI System Partition. Secure Boot protects against loading arbitrary EFI executables on that partition, e.g. an OS boot loader. It does so by checking any EFI executable against a signature store in the firmware. If the EFI executable is unsigned or the signature is not in the list of trusted signatures, the UEFI will refuse to boot that executable. The EFI System Partition itself is fair game because it's a FAT file system (most firmware implementations don't support anything else) which has no concept of any sort of access rights management like NTFS does to prevent anything from writing to it.

    • @ThioJoe
      @ThioJoe  9 หลายเดือนก่อน +6

      Good to know 🧐

    • @Sypaka
      @Sypaka 9 หลายเดือนก่อน

      You can protect the ESP by making it read-only using diskpart, when using Windows. I sadly don't know how this is done in Linux (yet). The problem here is, I don't know how Windows will react to this, if the ESP also has the BCD on it and it can't write to it.

    • @ZipplyZane
      @ZipplyZane 9 หลายเดือนก่อน +1

      @@Sypaka If software can set it as read-only, then malware could set it as writeable.

    • @Sypaka
      @Sypaka 9 หลายเดือนก่อน

      @@ZipplyZane -You are not wrong, but making the ESP read-only protects against attacks on the User Privilege level. Just because the ESP is marked as "hidden", doesn't mean, it's not existant. Everyone can write to it, even users under the "Guest" Privilege (the lowest priv level), let that sink in.- Sure, if malware expects the ESP read-only, there will be code to make it writeable. And it still needs Admin to do that. Unless you remove the right to edit drives from your account... (Edited, because i got them mixed up)

    • @betaswithWack0
      @betaswithWack0 9 หลายเดือนก่อน +1

      @@Sypaka this is incorrect, Windows does restrict access to the EFI system partition to Administrators. (this is a specifically hardcoded check for the EFI system partition only.)
      there was a time period where MS fucked up and removed this check, but this got fixed eventually

  • @edplat2367
    @edplat2367 9 หลายเดือนก่อน +78

    This honestly sounds like an exploit that could be easily patched by OEM'S. My worry is for computers or motherboards no longer receiving bios updates.

    • @brettlaw4346
      @brettlaw4346 9 หลายเดือนก่อน

      They tend to drag their feet. Getting a business grade laptop tends to expedite patching.

    • @aycc-nbh7289
      @aycc-nbh7289 9 หลายเดือนก่อน +3

      But as a Linux user, I’ve historically received updates before the exploits they patch make headlines like this. For all I know, it’s already been patched for my machine.

    • @Jeff-ss6qt
      @Jeff-ss6qt 9 หลายเดือนก่อน

      ​​@@aycc-nbh7289It's not an exploit in the operating system. It's an exploit in UEFI. To patch it, you'd need an UEFI update.

    • @mamailo2011
      @mamailo2011 9 หลายเดือนก่อน

      By contract they MUST provide critical updates. They do not make the patches, is intel o AMD, they only include the patch in the respective firmware file and make it aviable

    • @edplat2367
      @edplat2367 9 หลายเดือนก่อน +2

      @mamailo2011 I have an evga board (z690 dark) and the bios team and motherboard devision at evga is finished. I wonder what happens here when they don't have any developers any more.

  • @ManuFortis
    @ManuFortis 9 หลายเดือนก่อน +8

    A note about BIOS firmware updates. I can't say for certain for all Motherboard manufacturers, but Gigabyte at least is able to detect when the wrong firmware has been used, and won't allow it. Accidentally ran into this problem because of similar models of the same motherboard I have. Be super certain you have the right one otherwise, because some might not be so great at detecting the firmware as valid or invalid. Also, while in the past it was usually common practice to go through each bios update in order until finally updated to the most recent firmware; now-a-days you can usually just update to the newest firmware without a problem. BUT! You really should read through their notes on what is being changed, because sometimes there is something being done in one, that needs to be done first, before you can update to any other afterwards. Kind of rare, but it does happen.
    Just make sure to copy the existing firmware first before loading any new one, and you will at least have a backup for just in case.
    Oh, and one more thing. Some manufacturers allow for the disabling of the boot logo. Do that. Even if you update, disable it anyways. It's not really necessary to have in the first place beyond aesthetics, and disabling it makes it so the parser can't run the code in that image file.

    • @cylian91
      @cylian91 9 หลายเดือนก่อน

      "Gigabyte at least is able to detect when the wrong firmware has been used" do you know how they do it ? is it just a chemsum verification or its actualy check for compatibility ?

    • @runed0s86
      @runed0s86 9 หลายเดือนก่อน +2

      ​@@cylian91Lenovo has bootguard, but you can turn that off by changing a single bit in the firmware.

  • @kennystrawnmusic
    @kennystrawnmusic 9 หลายเดือนก่อน +49

    Once malware gets onto the ESP or, worse, motherboard, your chances of removing it without repartitioning your disk, reinstalling your OS (or replacing it with a different OS), or, in the worst case, reflashing your UEFI ROM are gone.

    • @Mempler
      @Mempler 9 หลายเดือนก่อน +10

      i mean, you can usually just delete the .efi file within the ESP partition without having to repartition, but it being able to flash the EFI rom is scary, however its also very hardware specific, so a wide range attack is unlikely

    • @null7639
      @null7639 9 หลายเดือนก่อน +3

      if it’s esp just wipe gpt and 0fill esp if paranoid (not in that order)

    • @tyroniebalonie
      @tyroniebalonie 9 หลายเดือนก่อน +1

      What if your motherboard has dual uefi? Couldnt I just switch my uefi if one of them got compromised or does this infect both?

    • @Mempler
      @Mempler 9 หลายเดือนก่อน +1

      @null7639 0 fill is not necessary. ESP is required to be FAT32 by uefi specification, thus if the fat is lost, it can no longer find the EFI file, making it safe to just clear the fat

    • @Mempler
      @Mempler 9 หลายเดือนก่อน +3

      @tyroniebalonie Unlikely, most motherboards who have dual bios need to be flashed separately in case something goes horrible wrong. Some even allow you to hardware flash without needing a bios at all, which is great.

  • @kiran9s
    @kiran9s 9 หลายเดือนก่อน +13

    I had to clean up the mess around first, and second week of February. A lot of the PCs running on Windows 10, 11, and Linux were affected. Most of my colleagues realised something was wrong, and shut down their computers immediately. But some of them didn't realise they were under attack. This resulted in malicious updates of BIOS firmware, and in some cases SSD firmware as well.
    In first step Windows Hello/UAC, defender were affected. In second step BIOS. In few cases settings of (home) router were updated as well.
    As a person who has been in computer science since 90s, I firmly believe that the firmware should not be able to be updated.

    • @futuza
      @futuza 9 หลายเดือนก่อน +9

      At the very least I'd like a physical switch on the board that prevents it from being written to

    • @kiran9s
      @kiran9s 9 หลายเดือนก่อน +2

      @@futuza the issue with the virus that I faced was it didn't "maliciously" rewrote/update the UEFI firmware. After affecting the UAC, it gave a notification that firmware update was available. UAC, defender, antiviruses were already affected, so the user/OS didn't find the update to be fake/malicious. Basically, user did the installation. Under such scenario a physical jumper would be pointless.

    • @futuza
      @futuza 9 หลายเดือนก่อน +2

      @@kiran9s Well if you're able to trick your user into flipping the switch then yeah it wouldn't do anything, but I think that would at least deter some, as having to open up their desktop/laptop and move a switch would require a lot more effort than most end-users would be willing to go to and cause them to think twice. (You might even padlock a desktop so only IT could unlock it without bypassing the physical lock). Hopefully some would call their IT department for help at that point and raise some red flags before it was really too late. But yeah a physical switch wouldn't make it hack proof just more difficult.
      Although if ROM were truly unwrittable it would also be unable to be patched so pre-existing vulnerabilities might not be possible to fix without replacing hardware.

    • @Yadlina
      @Yadlina 9 หลายเดือนก่อน

      can you tell more about that case? thats quite interesting. is there a reason for targeting these people? a firmware infection is even with logofail a special and individual case

    • @kiran9s
      @kiran9s 9 หลายเดือนก่อน +2

      @@Yadlina I don't think it was targeted as such. I believe the the virus didn't want to damage/disrupt anything (at least it didn't when we found it). I think all it wanted was data, a sophisticated malware.

  • @kote315
    @kote315 9 หลายเดือนก่อน +225

    Oh, did it happen again? Is some malware writing some bad things into the ROM again? Eh, some people in the computer industry never learn. This is far from the first similar case. Remember the CIH Chernobyl virus? This problem has existed since at least the 90s. And there is only one way to protect against this - to make the Read-Only-Memory truly Read-Only! (and place a switch/jumper to enable write, disabled by default).

    • @monad_tcp
      @monad_tcp 9 หลายเดือนก่อน +37

      Not only didn't they learn anything, they store the stupid ring -1 Intel ME in the same NVRAM flash easily rewritable, I literally reflashed it so I could run code inside my chipset, it was fun hacking that part of the hardware.

    • @OctoomyYTOfficial
      @OctoomyYTOfficial 9 หลายเดือนก่อน +3

      CIH only effected certain rarer mainboards from gigabyte and some oems. And making the BIOS unrewritable isn't going to solve anything, matter in fact its only going to cause more issues if new exploits are found in lets say... certain feature sets? Enjoy buying an updated motherboard every CPU revision.

    • @pafik_
      @pafik_ 9 หลายเดือนก่อน

      ​@@OctoomyYTOfficial If bios memory is read-only no virus will get inside. No virus will be found, that's all

    • @tablettablete186
      @tablettablete186 9 หลายเดือนก่อน +20

      The irony of having writable ROM (Read Only Memory) lol

    • @kikixchannel
      @kikixchannel 9 หลายเดือนก่อน +37

      @@OctoomyYTOfficial You should learn to read. He specifically said that the motherboards should have a switch to enable writing. In other words, it would be a PHYSICAL block that the user can remove and reinstate at will, blocking the remote access hacks while not affecting the actual user at all (well, barely affecting him...as you'd still need to switch it on and off now and then).

  • @Lauren_C
    @Lauren_C 9 หลายเดือนก่อน +10

    Given that my hardware is well past any manufacturer’s support date (my desktop is 4th gen Core), I don’t exactly have much choice but to run the UEFI as is.

  • @donaverboxwood
    @donaverboxwood 9 หลายเดือนก่อน +18

    An i correct in assuming that the standard "don't get a virus" advice - don't download sketchy files, don't open sketchy emails, virus scan everything you download, etc. - are still useful for preventing the virus from getting into a computer in the first place? Or is it possible to fall victim to this stuff without any user interaction?

    • @outasi_official
      @outasi_official 9 หลายเดือนก่อน +7

      yes, this in itself would require user interaction. however in case there's a new exploit found that runs code without the user's interaction, you could still be infected with this.

    • @heckerhecker8246
      @heckerhecker8246 9 หลายเดือนก่อน +15

      Unless a new zero-day is found which just gives anyone who opens a web browser a virus; I'd say, its still good advice

    • @futuza
      @futuza 9 หลายเดือนก่อน +1

      Yes, but zero-day exploits are extremely common (notice how often your browser and OS needs security updates for example)

    • @heckerhecker8246
      @heckerhecker8246 9 หลายเดือนก่อน +1

      ​@@futuza, True, but by then a lot of damage has already been done (if it's discovered by sum hacker)

    • @GabrielVilanova-n3p
      @GabrielVilanova-n3p 9 หลายเดือนก่อน +1

      Well we must do that at least till we get a proper firmware patch, until then: stay vigilant, keep running your third party anti-virus software in the background with all the active modules enabled, don't visit sketchy webpages, keep your web browser updated and obviously, only download your firmwares from the official manufacturer and so on.

  • @LastCrystal
    @LastCrystal 9 หลายเดือนก่อน +33

    One way to at least know if you got hit with that attack is to change your boot image to something custom yourself, other that the stock motherboard logo. Then if you get the virus it will probably change the image back to the stock one so you will easily noticed that something happened.

    • @robertvondarth1730
      @robertvondarth1730 9 หลายเดือนก่อน +2

      That sounds like good SOP

    • @shanent5793
      @shanent5793 9 หลายเดือนก่อน +11

      Malware isn't going to announce itself by displaying a different logo

    • @Yadlina
      @Yadlina 9 หลายเดือนก่อน +1

      I thought an out of bound will be possile: The Image parsing Process is hit by the special crafted image data which lead to a one time writing to a neighbbour memory area. so if you change the logo, it does not matter, because malware code was written the first time when the logo failed.

    • @jwhite5008
      @jwhite5008 9 หลายเดือนก่อน +1

      ​@@Yadlina Good point. But it may be a lot of additional work depending on the nature of the exploit. So replacing a logo (and then disabling it) is still a reasonable precaution.
      The question is what do you do if you see a manufacturer's logo again? Was it reset by a legitimate update fixing another potential exploit or malware? And if it's the latter then you may have quite a problem of deleting it. Once he exploit runs you cannot rely on anything in the computer being real - not the firmware settings - not changing the logo back - possibly not even emergency settings reset because the image is in non-resettable NAND together with the firmware code itself.

    • @key_bounce
      @key_bounce 9 หลายเดือนก่อน +1

      But: finding out that something changed is not the same as preventing the problem. How do you recover your system once the bios has been hacked?

  • @Xiy114
    @Xiy114 9 หลายเดือนก่อน +5

    The people that figure this stuff out are VERY dedicated and VERY patient.

  • @bobyrd74
    @bobyrd74 9 หลายเดือนก่อน +37

    I called this *years* ago when UEFI first came about and I saw that there was going to be a link between the OS and "BIOS".

    • @davidioanhedges
      @davidioanhedges 9 หลายเดือนก่อน +7

      Similar has been possible forever... as long as the BIOS/UEFI is writable from the OS it's a vulnerability -writable BIOS was a thing for a very long time before UEFI existed

  • @TheRealKaiProton
    @TheRealKaiProton 9 หลายเดือนก่อน +6

    Had a bunch of Lenovo's and Dell's have FW updates in the last couple of weeks, Wonder if its for this

  • @avvn9331
    @avvn9331 9 หลายเดือนก่อน +6

    This is interesting, are only laptop/pcs are effected or could it effect any other embedded devices too?

  • @brynduffy
    @brynduffy 9 หลายเดือนก่อน +4

    Thank you, this is the most important information I've come across this year by a long shot.

  • @casaraku1
    @casaraku1 9 หลายเดือนก่อน +1

    It looks like you are not going to go out of business any time soon Mr. Joe..... always fun to be had. Cheers.

  • @lmcgregoruk
    @lmcgregoruk 9 หลายเดือนก่อน +58

    My old ass system still boots Windows 10 from a non-UEFI bios.

    • @jwhite5008
      @jwhite5008 9 หลายเดือนก่อน +5

      If it has a functionality to load a user-provided image file it might still be vulnerable, AND the update for firmware this old won't be released ever...
      Although if your BIOS is text-only, it is likely to have the image stored in raw headerless uncompressed bitmap which would mean that it's probably not possible to exploit
      However this also means that your BIOS might not have a fix for all the vulnerabilities found since its last update

    • @chadfli
      @chadfli 9 หลายเดือนก่อน

      mine is from 2012 and is a dell. no uefi at all. so imight be safe, pls confirm

    • @eDoc2020
      @eDoc2020 9 หลายเดือนก่อน +1

      @@chadfli Most PCs released since 2011 have UEFI. It's very likely you have a UEFI-based firmware which boots in legacy mode. This would likely still be affected.

    • @spamburner9303
      @spamburner9303 9 หลายเดือนก่อน +3

      @eDOC2020 jokes on me, my computer still has PhoenixBIOS.

    • @eDoc2020
      @eDoc2020 9 หลายเดือนก่อน

      @@spamburner9303 I have AwardBIOS on a few systems.

  • @2PeteShakur
    @2PeteShakur 9 หลายเดือนก่อน +2

    cheers mate, just updated, issue fixed - but hate going through the update process cos it goes through 3 stages, updating and rebooting - at those times u get nervous and hope nothing bad happens like a power cut, but i heard can just reset the cmos battery and retry the update?...

  • @volvo09
    @volvo09 9 หลายเดือนก่อน +16

    Sweet, this is the stuff I really find interesting!

    • @HenryX-s2g
      @HenryX-s2g 9 หลายเดือนก่อน

      I am more interested in knowing what such childish move can steal... ... Hehehehe~
      Any PC or equipment I used which can be exposed to such risks... ... are more or less for casual purposes. And not even attached with banking details... ...
      As usual, they are welcomed to steal my gaming data, watch me game on, see what I surf... ... just don't interfere with my gaming and surfing pleasure.
      As for the real important 'secrets'... ... Hehehehehehehehehehe... ...
      They can try. Why not.

  • @byCDMC
    @byCDMC 9 หลายเดือนก่อน +16

    1:40 So what you're saying is; basically ASUS Armoury Crate

    • @albertwesker2k24
      @albertwesker2k24 9 หลายเดือนก่อน

      Goofy ahh software

    • @cylian91
      @cylian91 9 หลายเดือนก่อน

      yes, its even higher then riot's vengard (witch is technically a eufi driver, yes they run it higher then windows's kernel level but they also have an interface that is in the kernel)

    • @omegaprime516
      @omegaprime516 3 หลายเดือนก่อน

      Or even msi's version. Both are unsettling to deal with until you find that setting.

  • @Elytraz17
    @Elytraz17 9 หลายเดือนก่อน +12

    Why does this guy not get more views, likes, subs & comments.
    i love this guy's videos

    • @GregoryShtevensh
      @GregoryShtevensh 9 หลายเดือนก่อน

      I doubled my internet speed, with nothing other than 2 batteries, a cut Ethernet cable, and uncut cable, some electrical tape, and a human sacrifice, and all thanks to this guys' videos

    • @Elytraz17
      @Elytraz17 9 หลายเดือนก่อน

      @@GregoryShtevensh really?

    • @RT-.
      @RT-. 8 หลายเดือนก่อน

      @@Elytraz17 Sort his videos by old 😉

    • @Elytraz17
      @Elytraz17 8 หลายเดือนก่อน

      @@RT-. ok?.......

  • @monad_tcp
    @monad_tcp 9 หลายเดือนก่อน +9

    My computer is literally immune to that, its physically immune. I just severed the write trace going to the EPROM where the NVRAM is stored, its impossible for software to do that. I didn't do it for security but because I burned my secondary NVRAM and had to make a hack to keep the motherboard working.

    • @joaquingomezullrich878
      @joaquingomezullrich878 9 หลายเดือนก่อน +5

      Thats clever, physical acces is like god mode if you know what you're doing

    • @shanent5793
      @shanent5793 9 หลายเดือนก่อน

      The boot logo is typically on disk, so why would your system be immune?

    • @daanwindt1633
      @daanwindt1633 9 หลายเดือนก่อน +2

      ​@@shanent5793It can't screw with the bios even if the boot logo is modified, so wiping the disk will actually fix it

    • @shanent5793
      @shanent5793 9 หลายเดือนก่อน

      @@daanwindt1633 if it were immune then you wouldn't have to do anything, so why wipe the disk?

    • @daanwindt1633
      @daanwindt1633 9 หลายเดือนก่อน +2

      @@shanent5793 Because the code could do more than just write to the bios flash. That's what I would do at least, but I'm not a security expert

  • @Lebon19
    @Lebon19 9 หลายเดือนก่อน +17

    Thanks a lot Thio for this! I just updated the BIOSes of my Gigabyte X570 Aorus Master.
    ...and proceed to have all my settings wiped off, including my fan curves. But it was worth it for this vulnerability alone.

    • @Tom-kl9jf
      @Tom-kl9jf 9 หลายเดือนก่อน

      yes thanks Thio for the PSA, and me too. and don't forget your xmp settings

    • @cskillers1
      @cskillers1 9 หลายเดือนก่อน

      for future, you can save your bios profile settings on your hard drive whenever you are updating the bios
      saving inside the bios profiles also may work, but on some mobos these are also wiped during the flash, only on some though
      in most of cases, you can use profiles from older bios versions on new bios versions just fine
      but if there was massive change in upgraded version - the usage of old bios profile may bring a problem or to not work as it should

    • @Lebon19
      @Lebon19 9 หลายเดือนก่อน +2

      @@cskillers1I know about it. I just... only thought about it after the fact... when everything was gone.

    • @cskillers1
      @cskillers1 9 หลายเดือนก่อน

      @@Lebon19 yeah happens man, happened to me too

  • @Whit3hat
    @Whit3hat 9 หลายเดือนก่อน +1

    Thank you Thio will check in the morning. Also I noticed the screens behind you the one on the left contrast too high and color other one too low lol sorry I cant stand that on screens ended up just listening. Back to the topic, the north and south bridges...... wonder if it can also become infected after initially

  • @RKBenchmarker
    @RKBenchmarker 9 หลายเดือนก่อน +3

    If I'm on the latest bios, can I overwrite this virus with the same bios version or an older bios version and all is good? Thx

  • @nescolet
    @nescolet 9 หลายเดือนก่อน +1

    Thanks for the heads up. I updated my Gigabyte BIOS firmware to latest version, which does deal with this LogoFail issue.

  • @JohnSmith-xq1pz
    @JohnSmith-xq1pz 9 หลายเดือนก่อน +51

    So much for UEFI being waaaaaay safer then the old BIOS chips...
    Of course it's becouse of an oversight on the development team, checking ALL code for lagit signature should be standard

    • @kunka592
      @kunka592 9 หลายเดือนก่อน +18

      Knew this kinda thing would happen when I saw how complicated UEFI was compared to the old BIOS system.

    • @cylian91
      @cylian91 9 หลายเดือนก่อน +1

      yeah and eufi are actualy dumber then bios, they can load eufi driver wich is better (for things like usb driver) then bios but everything else is just fucked. The boot system is trash, its literaly stored in vram so no power = reset (its realy bad on laptop with removed battery, i run my server with mbr mode because of that and yes my server is a laptop), EUFI driver can literaly modify everything, that even include windows kernel thing. And since eufi driver can be close source (as oppose to linux driver wich are required to be open source if they want to be included by default and access some part of the interface) we don't know what they are doing and they could be harmfull.
      Proprietary tech is still kill tech industry.

    • @halfsourlizard9319
      @halfsourlizard9319 9 หลายเดือนก่อน +5

      At some level it's all held together with chewing gum and bailing twine 🙈

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott 9 หลายเดือนก่อน +3

      It was just a matter of time ... Hate UEFI.

    • @nomore6167
      @nomore6167 7 หลายเดือนก่อน +1

      "Of course it's becouse of an oversight on the development team, checking ALL code for lagit signature should be standard" - Lack of signature on an image file is not the big problem here. The problem is the OTHER vulnerabilities in the image display function which allow this exploit to occur (most likely, buffer overflow vulnerabilities). If the image display function was secure, then the only thing a rogue image file could do was cause a vulgar image to be displayed.

  • @mahakleung6992
    @mahakleung6992 9 หลายเดือนก่อน +1

    Thank you. I was unaware of this and will get our desktops and laptops flashed this week.

  • @daylightdies7194
    @daylightdies7194 9 หลายเดือนก่อน +2

    Thank you Joe and TH-cam for recommending this I’ll jump on the pc now and check for an bios update 🇬🇧👍

  • @shawndye7751
    @shawndye7751 9 หลายเดือนก่อน +2

    I'm pretty good with computers, however I have never done anything with BIOS before. I will just hope that I can find detailed instructions on how to go about doing an update to it. I will be getting a new laptop soon and hopefully by then I'll have something to go off of to update it

  • @EricTechstuffs
    @EricTechstuffs 9 หลายเดือนก่อน +5

    I honestly had this happen back in 1999 of course my parents computer... I bought a new award BIOS chip pop- in chip replacement (Imagine that now) pulled the CMOS bat. But years later, it was buried in the MBR drive I kept plugging in to it. I sure LEARNED from that butt whooping !

    • @aname-kg3cb
      @aname-kg3cb 9 หลายเดือนก่อน

      now these mobos hate their consumer and want to solder everything together to make sure they are screwed.

    • @eDoc2020
      @eDoc2020 9 หลายเดือนก่อน

      Socketed BIOS chips are not uncommon on higher-end "enthusiast" motherboards.

  • @michaelmonstar4276
    @michaelmonstar4276 9 หลายเดือนก่อน +1

    I just saw this mentioned in the BIOS change logs over at ASRock earlier, but many versions note that it's not recommended to update to those for most older CPUs, of which I use one that's on an ASRock board. So... Yea, not sure what to do.

  • @stayfunsteven2207
    @stayfunsteven2207 9 หลายเดือนก่อน +8

    I think you’re the first person I saw on TH-cam to call the UEFI actually UEFI and not BIOS. Or to say that it is actually caller UEFI and not BIOS.

    • @ChrisWijtmans
      @ChrisWijtmans 9 หลายเดือนก่อน

      uefi is still a BIOS

    • @stayfunsteven2207
      @stayfunsteven2207 9 หลายเดือนก่อน

      @@ChrisWijtmansit is not

    • @artfartzy
      @artfartzy 9 หลายเดือนก่อน

      @@stayfunsteven2207 UEFI (Unified Extensible Firmware Interface) is not the same as the traditional BIOS (Basic Input/Output System), although it serves a similar purpose as the software interface between the operating system and the firmware of a computer. UEFI is a modern replacement for BIOS, offering several advantages such as faster boot times, support for larger hard drives, a user-friendly graphical interface, and advanced security features like Secure Boot. While BIOS operates in 16-bit mode, UEFI can run in 32-bit or 64-bit mode, allowing for a more robust and feature-rich environment before the operating system loads.

    • @mrfoxesite6982
      @mrfoxesite6982 6 หลายเดือนก่อน

      nonsense

  • @woodsmn8047
    @woodsmn8047 9 หลายเดือนก่อน +1

    there have lately been troubles with steam games where when updates to lots of steam games for some reason get a notice that files are missing and the user does not have the correct permission to load said file and this prevents the game from being fully updated and thus remains unplayable ... I suspect some small game sellers are taking shots at the steam monopoly but that leaves the gaming community with one game after another knocked out of use ...could you take a look at this phenomena and tell us if or how to fix it ...?

  • @AC1131-i8d
    @AC1131-i8d 9 หลายเดือนก่อน +5

    Thanks for this - I have a Lenovo and it performed a firmware update this week.

    • @aname-kg3cb
      @aname-kg3cb 9 หลายเดือนก่อน

      which model do you have?
      i have the 81we model and it doesn't show up for recent bios updates.
      i got it in somewhere 2020

    • @AC1131-i8d
      @AC1131-i8d 9 หลายเดือนก่อน

      @@aname-kg3cb Ideapad 5 Creators Edition Pro 16ARH7

  • @JPs-q1o
    @JPs-q1o 9 หลายเดือนก่อน +2

    @ThioJoe How do you know/detect if you've been compromised by this?

  • @robh5695
    @robh5695 9 หลายเดือนก่อน +2

    Thanks, brother. Very informative as always.

  • @pb1963
    @pb1963 8 หลายเดือนก่อน +1

    I have 3 older computers (2 Dell and 1 Lenovo). I have checked for BIOS updates and they are not available. Now what?

  • @Necropheliac
    @Necropheliac 9 หลายเดือนก่อน +20

    Seems like letting the OS write to the BIOS was a really, really bad idea.

    • @chromerims
      @chromerims 9 หลายเดือนก่อน +5

      Emphasizing "Seems like letting the OS write to the BIOS was a really, really bad idea."

    • @nomore6167
      @nomore6167 7 หลายเดือนก่อน +1

      "Seems like letting the OS write to the BIOS was a really, really bad idea" - If the OS could not write to the BIOS, then there would be no way to update the BIOS other than by physically replacing the chip, which would be even worse. The problem is not letting the OS write to the BIOS. The problem is that companies do not place a strong enough emphasis on security (and, in this case, they apparently outsourced a trivial function which they could easily have written themselves, thereby creating the vulnerability).

    • @Necropheliac
      @Necropheliac 7 หลายเดือนก่อน +2

      @@nomore6167 ​​⁠ what you’re saying is not true. Updating the bios is never done via the operating system. It is done by inserting a USB key directly into the motherboard and instructing the write from a file on that USB. It is done before the operating system is loaded. It can also be done over the network by sending the file via the NIC but also in that case it is done before the Operating system is loaded.

    • @nomore6167
      @nomore6167 7 หลายเดือนก่อน +3

      @@Necropheliac "what you’re saying is not true. [Updating the bios] is done by inserting a USB key directly into the motherboard... It is done before the operating system is loaded" - No, it is YOU who are wrong. You clearly have no clue about what you speak. BIOS updating can POTENTIALLY be done by going into the BIOS and selecting to update from a file, *IF* it is designed that way and you have compatible hardware. However, updating the BIOS by running an executable from the OS has been done for decades.
      Also, I love how you're contradicting yourself by first saying "Seems like letting the OS write to the BIOS was a really, really bad idea" and then claiming that BIOS updates are never performed by the OS.

    • @chromerims
      @chromerims 7 หลายเดือนก่อน +2

      De-emphasizing "If the OS could not write to the BIOS, then there would be no way to update the BIOS other than by physically replacing the chip."
      Emphasizing "What you’re saying is not true. Updating the bios . . . is done by inserting a USB key directly into the motherboard and instructing the write from a file on that USB. It is done before the operating system is loaded."
      Kindest regards, friends and neighbours.

  • @xephael3485
    @xephael3485 9 หลายเดือนก่อน +49

    Bios needs to be standardized and open sourced completely via GPL3 across all platforms

    • @RadikAlice
      @RadikAlice 9 หลายเดือนก่อน +23

      So, Coreboot?

    • @dsihacks
      @dsihacks 9 หลายเดือนก่อน +5

      Chromebook moment

    • @Masterix.
      @Masterix. 9 หลายเดือนก่อน +12

      BIOSes and UEFIs are standardized.

    • @futuza
      @futuza 9 หลายเดือนก่อน +3

      Why GPL3 instead of GPL2?

    • @davidadams421
      @davidadams421 9 หลายเดือนก่อน

      UEFI is an open standard and there are plenty of open source implementations available. Proxmox actually uses one.

  • @peconi47
    @peconi47 9 หลายเดือนก่อน +1

    some pcs and laptops, mainly lenovo ones, when reinstalling/reformatting ask you if you want to reset your bios, pretty useful

  • @saptadeepnath5664
    @saptadeepnath5664 9 หลายเดือนก่อน +25

    Reminds me back of the CIH virus

    • @JohnSmith-xq1pz
      @JohnSmith-xq1pz 9 หลายเดือนก่อน +4

      Fun fact a friend of mine his family computer was one of the few the payload actually worked on.

    • @cylian91
      @cylian91 9 หลายเดือนก่อน +1

      @@JohnSmith-xq1pz wait you tried on your friend's famility computer ? lmao

    • @JohnSmith-xq1pz
      @JohnSmith-xq1pz 9 หลายเดือนก่อน +1

      @@cylian91 🤣🤣🤣 Well actually, it was something he download that let CIH in, they only figured that out after the replacement computers anti virus cought it

  • @bravohomie
    @bravohomie 9 หลายเดือนก่อน +1

    you have come a long way from your original content lol thank you for the update

  • @johnsparozich6839
    @johnsparozich6839 9 หลายเดือนก่อน +19

    There are no more Bios updates for my computer as it is too old.
    Thank you for your videos and your insight!

    • @homuraakemi9556
      @homuraakemi9556 9 หลายเดือนก่อน +11

      Yes, it is extremely frustrating that manufacturers aren't going to fix this on many computers, including some that aren't all that old.

    • @Darkk6969
      @Darkk6969 9 หลายเดือนก่อน +1

      Someone suggested to turn off display LOGO in BIOS settings.

    • @cringesh1t427
      @cringesh1t427 8 หลายเดือนก่อน

      @@Darkk6969I think I also saw someone else mention it would still work despite that being disabled since the code for the logo still resides in the uefi or soemthing like tht

  • @Lurch-Bot
    @Lurch-Bot 9 หลายเดือนก่อน +2

    these are the things that keep me awake at night and why I decided to study cybersecurity.

  • @Amaranthine1000
    @Amaranthine1000 9 หลายเดือนก่อน +3

    Although I updated my BIOS only a couple of months back, I immediately went to check if there was a new BIOS even before finishing your video and there was, so I updated immediately. It is always a nerve wracking experience updating the BIOS as you never know if at that particular point in time is when some idiot is going to crash their car into the power pole and take out the power, or an unscheduled power shutdown will occur. At least now with Dual BIOS if that does happen I can at least get back up and running, but in the years before dual bios was a thing I hated doing bios updates.

    • @PracticaProphetica
      @PracticaProphetica 9 หลายเดือนก่อน +1

      Yep, there is always that fear...."c'mon BIOS, hurry up and finish!" You could plug into a UPS, but how many of us have working ones lying around?

    • @eDoc2020
      @eDoc2020 9 หลายเดือนก่อน +1

      Most of my older systems have bootblock recovery. If the main BIOS image is bad it has just enough functionality built in to load a replacement from floppy. On newer boards without floppy support a USB drive can be used.

  • @garbhanmyles
    @garbhanmyles 9 หลายเดือนก่อน +1

    May the gods bless your wee cotton socks, sir. Managed to get a BIOS update for these shenanigans which I was oblivious to. Thanks, boss! 🙏

  • @hollow314
    @hollow314 9 หลายเดือนก่อน +17

    Guess laptops are screwed then. My laptop is not even that old but the latest bios is from September 2023

    • @Content_Deleted
      @Content_Deleted 9 หลายเดือนก่อน +1

      That's... fairly recent, though?

  • @dudemiester75
    @dudemiester75 9 หลายเดือนก่อน +1

    Done all of my devices last night. Thanks👌

  • @fullofmysteries
    @fullofmysteries 9 หลายเดือนก่อน +9

    Can't we get rid of a BIOS/firmware virus by reflashing/updating the BIOS?

    • @shanent5793
      @shanent5793 9 หลายเดือนก่อน +7

      An infected system won't let you do that. It would need to be rewritten by an external programmer

    • @Yadlina
      @Yadlina 9 หลายเดือนก่อน +7

      if you really have a bios infection, forget the system. you cannot trust any of your hardware devices at that time. even if you can sucessfully reflash the bios to normal, the nic or gpu bios could be infected too. if you are confronted with such problems, chances are there are serious psychopats chasing on you. (or a 3 letter agency is interested in you, but in this case you most likely wont detect the infection)

    • @raylopez99
      @raylopez99 9 หลายเดือนก่อน +3

      @@Yadlina LOL. Next you'll be claiming such a virus can jump the air gap and infect your system from the speakers of an adjacent PC. Kids these days...

    • @Yadlina
      @Yadlina 9 หลายเดือนก่อน

      ​@@raylopez99what are you dreamin about? assume you have a firmware level infection and think about the implications of that fact. this is not an ordinary malware infection and is well crafted to one individual system. just only you cannot comprehend the implications should not leading you to such a bold (and ludicrous) statement

    • @raylopez99
      @raylopez99 9 หลายเดือนก่อน

      @@Yadlina You don't understand either sarcasm nor the actual virus that can jump an airgap (Google this). Study more son and when you're at my level (I code for fun, C# is my language) let's continue the conversation.

  • @mrchillgreen
    @mrchillgreen 8 หลายเดือนก่อน +1

    @ThioJoe
    Special question what if i disable the boot logo on startup so it never shows up and may actualy never get loaded would that also help?

  • @TheRealMangoDev
    @TheRealMangoDev 9 หลายเดือนก่อน +337

    dont comment “first”

    • @volvo09
      @volvo09 9 หลายเดือนก่อน +20

      Firs.

    • @mislavbraovac6070
      @mislavbraovac6070 9 หลายเดือนก่อน +10

      First

    • @itsmaxim01
      @itsmaxim01 9 หลายเดือนก่อน +40

      oneth

    • @iCoffeeGD
      @iCoffeeGD 9 หลายเดือนก่อน +6

      first

    • @AshtonSnapp
      @AshtonSnapp 9 หลายเดือนก่อน +8

      tsrif

  • @ScottDaniel-zj8sn
    @ScottDaniel-zj8sn 6 หลายเดือนก่อน +1

    I have been struggling with this for years and my MacBook Pro was the last device that I purchased that fell victim to this. I would be happy to elaborate, every phone, laptop, desktop, etc. I know how it sounds, but my devices have been doing exactly what you described since 2013, new or otherwise.

    • @alfonzo7822
      @alfonzo7822 5 หลายเดือนก่อน

      Glad to find someone else with this. I've been fighting it for around 5 years now. Even replaced everything and got rid of it for a few months. Everyone I've spoken to thinks I'm crazy.

  • @Stepan_H
    @Stepan_H 9 หลายเดือนก่อน +6

    Thanks for the information. Slightly frightened, I checked version of my actual "BIOS" and It includes a fix for this exploit.
    I generally update the firmware and software of all devices, precisely because it addresses not only bug fixes, but also various exploits.

  • @lylesback2
    @lylesback2 9 หลายเดือนก่อน +1

    Thanks! I wasn't aware of this and just updated my systems

  • @whoeverofhowevermany
    @whoeverofhowevermany 9 หลายเดือนก่อน +4

    There haven't been any instances of this attack type yet, and that's why it's important to post a video about it on a popular channel. Request heard.

    • @Natzawa
      @Natzawa 9 หลายเดือนก่อน

      It’s a double edge sword since the hackers who didn’t know are now aware of this.

    • @whoeverofhowevermany
      @whoeverofhowevermany 9 หลายเดือนก่อน

      @@Natzawa no, I think that's the only edge it's got. It's just telling people about an unexploited vulnerability. It doesn't count as a warning since there is no danger.

    • @fireteamomega2343
      @fireteamomega2343 7 หลายเดือนก่อน

      Because in any case it requires privilege escalation... anyway in most all scenarios it would be pointless to brick a computer you just spent time getting access to.

  • @Steve30x
    @Steve30x 9 หลายเดือนก่อน +1

    I always disabled Thea motherboard boot pogo thing. I want to see the classic post text which shows what's happening.

  • @dzikidzikers4082
    @dzikidzikers4082 9 หลายเดือนก่อน +3

    "It's a hack that replace image on a startup with a malicious code"
    Wait you can change startup image? i wonder what should i change my image to?
    (later in a video)
    MSI users are safe because startup image cannot be changed in these motherboards
    darn... well at least I'm safe

  • @FriskyMeerkat
    @FriskyMeerkat 9 หลายเดือนก่อน +1

    My motherboard maker has put out an updated bios for logoFail, however it is labeled as Beta. Should I flash the Bios with this Beta version or wait for the full version Bios?

    • @capn
      @capn 9 หลายเดือนก่อน

      If you download a lot of files or visit many websites, it may be best to play it safe and update. I updated to my manufacturer's beta as soon as I learned about it.

    • @FriskyMeerkat
      @FriskyMeerkat 9 หลายเดือนก่อน

      Okay ty.

  • @PinkShades
    @PinkShades 9 หลายเดือนก่อน +16

    Don't get a friend who is "good with computers," get a friend who IS good with computers.

    • @NotEvents
      @NotEvents 9 หลายเดือนก่อน

      🤣

    • @Sypaka
      @Sypaka 9 หลายเดือนก่อน

      Reminds me of that one time, my cousin had to ask someone else. When I visited him, all his programs were reverted to shit versions. Even Winamp was reverted to 1.x - I installed Winamp 3.x prior this "I know what I do" dude. Took me 4 hours to get his PC back to work properly.
      When I asked why that dude reinstalled Winamp, my cousin said, that guy said "thats not Winamp, Winamp XP doesn't exist". This guy literally didn't know what a Winamp Skin is.

  • @tigerscott2966
    @tigerscott2966 9 หลายเดือนก่อน +1

    This is why it's a must to have an Arsenal today...
    You need extra computers, laptops and mobile devices and a backup hard drive..

  • @Act_of_Random_Kindness
    @Act_of_Random_Kindness 9 หลายเดือนก่อน +25

    New fear unlocked ☠️

    • @ivok9846
      @ivok9846 9 หลายเดือนก่อน +1

      why? do you not think windows is more useful to hackers than bios?
      this won't even be used, just like spectre/meltdown....

    • @Rblx_GlamDoors
      @Rblx_GlamDoors 6 หลายเดือนก่อน

      Agreed 💀💀

  • @LBmaster
    @LBmaster 9 หลายเดือนก่อน +2

    Is there a source, which has a list of motherboards or BIOS Versions, which are vulnerable to this exploit ?

    • @jothain
      @jothain 9 หลายเดือนก่อน

      Better, which aren't.

    • @LBmaster
      @LBmaster 9 หลายเดือนก่อน +3

      I just checked the Manufacturer Website of my Motherboard and found an update for this exploit. Definitely worth checking there and update it

  • @_SJ
    @_SJ 9 หลายเดือนก่อน +36

  • @lajawi.
    @lajawi. 9 หลายเดือนก่อน +1

    Could or did you make a video about Windows automatically enableing BitLocker for the C drive, if certain requirements are met?

  • @alternatuber6698
    @alternatuber6698 9 หลายเดือนก่อน +4

    00:02 Find his wife's dirty videos on the internet.

    • @hassoselb02
      @hassoselb02 6 หลายเดือนก่อน +1

      Lmaooo 😂😂😂

    • @Manny0404
      @Manny0404 4 หลายเดือนก่อน +2

      Bruh

  • @doug1olson
    @doug1olson 9 หลายเดือนก่อน +1

    Thanks. I’ll be looking for bios updates.

  • @scottd.6664
    @scottd.6664 9 หลายเดือนก่อน +6

    I am beginning to think there are only two real problems in our world today: 1. Windows, and 2. Microsoft's attempts to prevent their own cancerous products from being cured.

  • @erikandreassen6531
    @erikandreassen6531 9 หลายเดือนก่อน +1

    They've brought it back. Back in the late 80's to early 90's there was one that wiped your bios. The reason it worked was a jumper setting on the motherboard. You had the option of allowing the bios to be programmed or locked and as a default came as programmable. Gigabyte came out with a dual bios to cope with that one being programmable and the other permanently fixed with a jumper that allowed you to overwrite the programmable bios with the original. Also back then the chip that held the bios was capable of being removed and reprogrammed. Guess that's all gone now and with laptop's they never had that protection except in bios and guess the default setting. This is the reason mobile phones have a ROM and separate user space for updates and your files, apps etc

  • @_SJ
    @_SJ 9 หลายเดือนก่อน +4

    Is this reality?

  • @AmyraCarter
    @AmyraCarter 9 หลายเดือนก่อน +1

    Yeah. I'll definitely be looking deeper into this. Thanks.
    One note: if somehow, power is lost during a BIOS/UEFI firmware flash, depending on the hardware, it's possible to have a firmware backup restore what was lost, but not all hardware configs support this, but my older DELL, which I no longer have (stolen!), supported this, and I know for a fact, that my current PC, also a DELL, supports this. However, if it does not, there usually is a way to reset the firmware, but it requires a lot of technical knowledge and probably two, three grand worth of specialized equipment most people won't have, because there's no way to do it with just a connected keyboard anymore, not since Windows XP, anyway.
    As for this weird exploit, why is it even a thing?

    • @eDoc2020
      @eDoc2020 9 หลายเดือนก่อน +1

      It doesn't cost anywhere near two thousand dollars for the equipment to reset a BIOS chip. You just need a programmer and a way to connect it to the chip. I've done it twice myself. First time was with a $35 Raspberry Pi and the second time was with a $9 FTDI adapter. Worst case you need to fully remove the BIOS chip from the board but I did this with a standard soldering iron.

  • @ActuallyMichael
    @ActuallyMichael 9 หลายเดือนก่อน +5

    I have a MSI motherboard so hopefully I'm safe

    • @pankoza
      @pankoza 9 หลายเดือนก่อน +2

      me too, and I have Windows installed in Legacy mode

    • @cylian91
      @cylian91 9 หลายเดือนก่อน

      @@pankoza you are safe in legacy mode but why do you run in legacy mode ?

    • @Oweblow
      @Oweblow 9 หลายเดือนก่อน

      @@cylian91 Bro probably forgot to enable UEFI boot.

    • @pankoza
      @pankoza 9 หลายเดือนก่อน +1

      the PC originally had Windows 7 and I didn't feel like enabling UEFI mode@@cylian91

    • @ChrisWijtmans
      @ChrisWijtmans 9 หลายเดือนก่อน

      msi got hacked ... so no we are screwed.

  • @MichaelZimmermann
    @MichaelZimmermann 9 หลายเดือนก่อน +2

    Attack1(EFI partition logo) shouldn't matter because that can be removed by wiping your disk (like any other virus). Attack3(SPI flasher) is actually very relevant for second-hand hardware because the seller or a previous owner could have done that to the board.

    • @rovano10
      @rovano10 9 หลายเดือนก่อน

      Exactly. Rather than risk anything, entire server boards are thrown away.

  • @vectoralphaSec
    @vectoralphaSec 9 หลายเดือนก่อน +3

    Just wipe the BIOS.

    • @RoyCyberPunk
      @RoyCyberPunk 9 หลายเดือนก่อน

      You do that you might as well buy a whole new computer or motherboard afterwards just saying.

    • @m3chanist
      @m3chanist 9 หลายเดือนก่อน

      @@RoyCyberPunkHardly..have you never updated a system's BIOS from a thumb drive?

    • @RoyCyberPunk
      @RoyCyberPunk 9 หลายเดือนก่อน

      @@pbox8728
      The only way that a board could do this is if it has a separate ROM that has such a set of instructions.

    • @m3chanist
      @m3chanist 9 หลายเดือนก่อน

      @@pbox8728 wtf. Every laptop can be flashed. I've never seen one that can't. Lol. This has nothing to do with flashback

    • @m3chanist
      @m3chanist 9 หลายเดือนก่อน

      @@RoyCyberPunk drivel.

  • @sanman187-
    @sanman187- 9 หลายเดือนก่อน +1

    Outstanding video. TJ! Thank you!!

  • @DrPeeper
    @DrPeeper 9 หลายเดือนก่อน +5

    I think non-uefi devices are also safe

  • @AndersHass
    @AndersHass 9 หลายเดือนก่อน +1

    As far as I can tell, my fairly new Lenovo laptop has patched this but some older ones haven’t yet (really old ones won’t get any updates).

  • @Eliotah
    @Eliotah 9 หลายเดือนก่อน +6

    Not first

  • @creeperizak8971
    @creeperizak8971 9 หลายเดือนก่อน +1

    Isn't there a setting in the bios that lets you skip the startup logo, or does that not protect you?

    • @Yadlina
      @Yadlina 9 หลายเดือนก่อน

      that will protect you if you turn it off right now and your logo is safe.

    • @creeperizak8971
      @creeperizak8971 9 หลายเดือนก่อน

      @@Yadlina I'm pretty sure I turned it off when I heard about this a while back, but I can probably just update my bios now, but this would be good to know for people who won't be getting an update.

  • @fizixx
    @fizixx 9 หลายเดือนก่อน +1

    Good info Joe, thanks! I have never updated my BIOS. Every time I've ever looked into it the methods/instructions/guidelines are so convoluted and broken I could not understand wtf they were talking about, so it was never worth my risking trying to unravel the spaghetti-sentences to do it. So, I will probably not do it now either, as I can't see how things have become easier to understand. Computer info doesn't seem to go in that direction.

  • @antoniohagopian213
    @antoniohagopian213 9 หลายเดือนก่อน +2

    Using secure folder/controlled access on windows is very important, even if you install weird nonsense it will prevent anything you didn't whitelist from writing to those critical places.

  • @davidadams421
    @davidadams421 9 หลายเดือนก่อน +2

    This is very similar to Computrace (now Absolute Software) which was/is firmware code (adding in partnership with the motherboard manufacturer) that forces a re-installation of its software whenever an operating system is installed. Once 'activated' there was no way to stop it installing itself ... not malware, but behaves in the same way. 'boot loader' viruses back again!

  • @Iowcatalyst
    @Iowcatalyst 9 หลายเดือนก่อน

    would taking the bios battery out get rid of this or are any changes permanently written into the firmware? [As long as you haven't installed a infected bios]

  • @cmardle07
    @cmardle07 9 หลายเดือนก่อน +2

    1. Enable Secure boot
    2. Enable TPM
    3. Enable Credentials Guard with TPM
    4. Enable bitlocker or other disk encryption software
    5 Make sure you have UEFI password protected. (Use a strong password)
    6. Disable all other boot options, and select the internal drive as the only available boot device.
    7. Patch the system with the latest security updates if needed
    8. Only download UEFI updates from the manufacturers website, and always check the checksum against the hash value of the UEFI update file.
    It's not a perfect solution but it's the best we've got.

    • @chromerims
      @chromerims 9 หลายเดือนก่อน

      Emphasizing, "1. Enable Secure boot
      2. Enable TPM
      3. Enable Credentials Guard with TPM
      4. Enable bitlocker or other disk encryption software
      5 Make sure you have UEFI password protected. (Use a strong password)
      6. Disable all other boot options, selecting the internal drive as the only available boot device
      7. Patch the system with latest security updates if needed
      8. Only download UEFI updates from the manufacturers website, and always check the checksum against the hash value of the UEFI update file."

  • @d_shepperd
    @d_shepperd 9 หลายเดือนก่อน +1

    I updated my BIOS/UEFI and now Windows says it isn't activated anymore. There appears no way to fix it. If I ever buy another Windows license, it will have to be to get a license key on a physical piece of paper. No more cloud based licensing for me.

    • @KinCryos
      @KinCryos 9 หลายเดือนก่อน

      if the Windows license wasn't included with a new PC, calling Microsoft should help. it worked for me when I upgraded my motherboard and my Windows license was from the Windows 10 Insider beta. they even attached the license to my Microsoft account (as opposed to using a hardware fingerprint) so I wouldn't get the same problem following another hardware upgrade

  • @futuristicentity2417
    @futuristicentity2417 7 หลายเดือนก่อน +1

    Is it possible to format the motherboard entirely how realistic is this option?

  • @hamburger_eatspie
    @hamburger_eatspie 6 หลายเดือนก่อน

    What kind of image files are used? Are they common ones like jpg, png, or is it a less secure file? (I’ve heard that some images can have malware embedded into it and can inject itself just from downloading the image)