Sunday, December 8, 2013

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn't know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.

In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.

"We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."

In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.

Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.

"We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD," Ruiu said. "At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we're using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys."

Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world's foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer's Basic Input/Output System (BIOS), Unified Extensible Firmware Interface (UEFI), and possibly other firmware standards, the malware can attack a wide variety of platforms, escape common forms of detection, and survive most attempts to eradicate it.

But the story gets stranger still. In posts here, here, and here, Ruiu posited another theory that sounds like something from the screenplay of a post-apocalyptic movie: "badBIOS," as Ruiu dubbed the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps.

Bigfoot in the age of the advanced persistent threat

At times as I've reported this story, its outline has struck me as the stuff of urban legend, the advanced persistent threat equivalent of a Bigfoot sighting. Indeed, Ruiu has conceded that while several fellow security experts have assisted his investigation, none has peer reviewed his process or the tentative findings that he's beginning to draw. (A compilation of Ruiu's observations is here.)

Also unexplained is why Ruiu would be on the receiving end of such an advanced and exotic attack. As a security professional, the organizer of the internationally renowned CanSecWest and PacSec conferences, and the founder of the Pwn2Own hacking competition, he is no doubt an attractive target to state-sponsored spies and financially motivated hackers. But he's no more attractive a target than hundreds or thousands of his peers, who have so far not reported the kind of odd phenomena that has afflicted Ruiu's computers and networks.

In contrast to the skepticism that's common in the security and hacking cultures, Ruiu's peers have mostly responded with deep-seated concern and even fascination to his dispatches about badBIOS.

"Everybody in security needs to follow @dragosr and watch his analysis of #badBIOS," Alex Stamos, one of the more trusted and sober security researchers, wrote in a tweet last week. Jeff Moss—the founder of the Defcon and Blackhat security conferences who in 2009 began advising Department of Homeland Security Secretary Janet Napolitano on matters of computer security—retweeted the statement and added: "No joke it's really serious." Plenty of others agree.

"Dragos is definitely one of the good reliable guys, and I have never ever even remotely thought him dishonest," security researcher Arrigo Triulzi told Ars. "Nothing of what he describes is science fiction taken individually, but we have not seen it in the wild ever."

Been there, done that

Triulzi said he's seen plenty of firmware-targeting malware in the laboratory. A client of his once infected the UEFI-based BIOS of his Mac laptop as part of an experiment. Five years ago, Triulzi himself developed proof-of-concept malware that stealthily infected the network interface controllers that sit on a computer motherboard and provide the Ethernet jack that connects the machine to a network. His research built off of work by John Heasman that demonstrated how to plant hard-to-detect malware known as a rootkit in a computer's peripheral component interconnect, the Intel-developed connection that attaches hardware devices to a CPU.

It's also possible to use high-frequency sounds broadcast over speakers to send network packets. Early networking standards used the technique, said security expert Rob Graham. Ultrasonic-based networking is also the subject of a great deal of research, including this project by scientists at MIT.

Of course, it's one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But as Triulzi suggested, it's another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. What's more, use of a USB stick to infect an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran's nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.

"Really, everything Dragos reports is something that's easily within the capabilities of a lot of people," said Graham, who is CEO of penetration testing firm Errata Security. "I could, if I spent a year, write a BIOS that does everything Dragos said badBIOS is doing. To communicate over ultrahigh frequency sound waves between computers is really, really easy."

Coincidentally, Italian newspapers this week reported that Russian spies attempted to monitor attendees of last month's G20 economic summit by giving them memory sticks and recharging cables programmed to intercept their communications.

Eureka

For most of the three years that Ruiu has been wrestling with badBIOS, its infection mechanism remained a mystery. A month or two ago, after buying a new computer, he noticed that it was almost immediately infected as soon as he plugged one of his USB drives into it. He soon theorized that infected computers have the ability to contaminate USB devices and vice versa.

"The suspicion right now is there's some kind of buffer overflow in the way the BIOS is reading the drive itself, and they're reprogramming the flash controller to overflow the BIOS and then adding a section to the BIOS table," he explained.

He still doesn't know if a USB stick was the initial infection trigger for his MacBook Air three years ago, or if the USB devices were infected only after they came into contact with his compromised machines, which he said now number between one and two dozen. He said he has been able to identify a variety of USB sticks that infect any computer they are plugged into. At next month's PacSec conference, Ruiu said he plans to get access to expensive USB analysis hardware that he hopes will provide new clues behind the infection mechanism.

He said he suspects badBIOS is only the initial module of a multi-staged payload that has the ability to infect the Windows, Mac OS X, BSD, and Linux operating systems.

Dragos Ruiu.

"It's going out over the network to get something or it's going out to the USB key that it was infected from," he theorized. "That's also the conjecture of why it's not booting CDs. It's trying to keep its claws, as it were, on the machine. It doesn't want you to boot another OS it might not have code for."

To put it another way, he said, badBIOS "is the tip of the warhead, as it were."

“Things kept getting fixed”

Ruiu said he arrived at the theory about badBIOS's high-frequency networking capability after observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility that it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed the internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped.

With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on.

"The airgapped machine is acting like it's connected to the Internet," he said. "Most of the problems we were having is we were slightly disabling bits of the components of the system. It would not let us disable some things. Things kept getting fixed automatically as soon as we tried to break them. It was weird."

It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either.

"It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was," Ruiu concluded in an interview. "The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers."

Source: ars technica

FBI able to secretly turn on laptop cameras without triggering indicator light ‘for several years’

In a recent report by The Washington Post, it was revealed that the FBI has been able to secretly activate a target’s laptop camera “without triggering the light that lets users know it is recording” for several years.

While this may be surprising to some, it really shouldn’t be. Previous reports revealed that the FBI employs hackers to create software to remotely activate the microphones on laptops and cell phones as well as cameras. The U.S. government has also become the world’s largest buyer of malware. The NSA also recommended physically removing the webcam from Apple laptops for security reasons.

In August, the Wall Street Journal reported that the FBI has developed hacking tools like this for over a decade, though they rarely are discussed publicly.

The Washington Post cites Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, who said that the remote activation of cameras is used mostly in serious cases.

Thomas, who now sits on the advisory board of Subsentio, a company that helps telecommunications firms comply with federal wiretap laws, told the Post that the bureau uses the technique “mainly in terrorism cases or the most serious criminal investigations.”

As technology advances, the FBI’s surveillance techniques do as well.

“Because of encryption and because targets are increasingly using mobile devices, law enforcement is realizing that more and more they’re going to have to be on the device — or in the cloud,” Thomas said.

Indeed, in January of this year a report indicated that all data stored on cloud services could be accessed by the U.S. government without a warrant.

In the past, a federal magistrate rejected the FBI’s attempt to get authorization to activate the laptop camera of a suspect. The magistrate ruled that it was “extremely intrusive” and could be a violation of the Fourth Amendment.

Federal magistrate Judge Stephen W. Smith also said the Texas-based court did not have the jurisdiction to approve the search of a computer in an unknown location.

Yet, another federal magistrate approved sending surveillance software to a target, though it did not involve remotely activating a computer camera.

The surveillance software gave the FBI a detailed account of the computer of the target – a federal fugitive – including his hard drive space, the chips used on his computer and a list of installed programs.

In the case the Post was reporting on, an individual calling himself “Mo,” probably located in Tehran, made a series of bomb threats.

The FBI obtained a warrant to send surveillance software to Mo’s computer when he sign in to his Yahoo email account but the program “never actually executed as designed,” according to a handwritten note by a federal agent given to a court.

Source: End the Lie

10 Simple, Cheap Home Gardening Innovations to Set You on the Path to Food Independence

The issue of food quality and food independence is of critical importance these days, and people are recognizing just how easy and fun it is to grow your own food at home. When renegade gardener Ron Finley said, “growing your own food is like printing money,” he was remarking on the revolutionary nature of re-establishing control over your health and your pocket book as a means of subverting the exploitative and unhealthy food systems that encourage the over-consumption of processed and fast foods.

Thanks to the internet, the availability of parts and materials, and good old-fashioned ingenuity, there is a wide range of in-home, and in-apartment, gardening systems that are easy to construct and maintain, and that can provide nutritious, organic, and low-cost food for you and your family. Once you realize jut how rewarding home gardening can be, it is tremendously fun to experiment with different systems and ideas for best producing your favorite healthy, fresh fruits and veggies.

Since everyone’s gardening space, interests and budgets differ, here are 10 simple ideas and how to’s for getting a small, affordable, and easy to construct gardening system up and running in your home.

Aquaponics

Aquaponics is growing in popularity as a versatile method of growing nutritious vegetables while raising fish, combining hydroponic gardening with aquaculture. Systems can be built to fit in almost any location, indoors or outdoors, and can be designed for almost any crop or edible fish.

Read: Aquaponic Gardening: A Step-By-Step Guide to Raising Vegetables and Fish Together

Here is a simple affordable home aquaponics system that can be adapted. Be sure to read the comments below the video for additional insight and afterthoughts on this simple system…

This is a great example of an apartment size indoor aquaponics system…

Vertical Gardening

Vertical gardening is a terrific method of growing more plants in a smaller area by constructing standing or hanging planters that can house many plants in a small space.

The easy and affordable example below can be adapted for many different fruits and veggies, or scaled for larger purposes…

The following video is an example of a simple and cheap, stand-up pallet vertical garden…

Simple Greenhouse Designs

Greenhouses are imperative for starting many types of edible plants and can also offer protection against some garden pests while increasing the length of your growing season.

Easy to build hoop house green house how-to…

How to build a backyard fence-rested greenhouse…

Cold Frames for Winter Gardening

Cold frames are an excellent and affordable way of growing nutritious ground crops in colder climates and during the winter…

Read: Backyard Winter Gardening: Vegetables Fresh and Simple, In Any Climate without Artificial Heat or Electricity the Way It’s Been Done for 2,000 Years

Simple winter cold frame garden…

Composting

Composting is an essential part of every garden, is the best way to dispose of everyday organic kitchen refuse, and provides free plant-food for your garden.

Read: Let it Rot!: The Gardener’s Guide to Composting (Third Edition) (Storey’s Down-To-Earth Guides) 

3-bin compost system using free pallets…

Cheap do-it-yourself worm composter…

Ideas for Apartment Gardening

Living in an apartment can mean you have to be more creative and imaginative with the space you have. Here are some resources and ideas for finding and setting up your apartment garden.

Read: Apartment Gardening: Plants, Projects, and Recipes for Growing Food in Your Urban Home

Here are some useful tips on finding space for your apartment garden…

We hope that you find the inspiration to find out for yourself just how easy, fun, and liberating home gardening can be as further stress on our collective food systems continues to drive up prices and drive down nutrition.

Gardening is both addictive and contagious, so be prepared to have fun, grow some tasty food, and meet some new friends once your neighbors hear about your success.

Source: Waking Times

105 Scientists Slam GMO-Rat-Study Retraction



What kind of hornet’s nest was opened up for the GM industry in view of the retraction of the two year "Long term toxicity of a Roundup herbicide and a Roundup-tolerant genetically modified maize", by G E Séralini et al, published in Food and Chemical Toxicology 2012, 50(11), 4221-31?

According to the article published December 5, 2013 in the Ecologist,
This arbitrary, groundless retraction of a published, thoroughly peer-reviewed paper is without precedent in the history of scientific publishing, and raises grave concerns over the integrity and impartiality of science. These concerns are heightened by a sequence of events surrounding the retraction: 
  • the appointment of ex-Monsanto employee Richard Goodman to the newly created post of associate editor for biotechnology at FCT 
  • the retraction of another study finding potentially harmful effects from GMOs (which almost immediately appeared in another journal) 
  • the failure to retract a paper published by Monsanto scientists in the same journal in 2004, for which a gross error has been identified. [1]
The first bulleted item apparently speaks volumes as to Monsanto’s tactics in gaining corporate-style control over many segments of society, commerce, and government. Shouldn’t someone question the revolving door policy Monsanto’s former chief lobbyist Michael Taylor [2] has enjoyed at federal agencies, and now as FDA Deputy Commissioner for Foods? Can that be why we have FDA-mandated “No GMO Labeling of Foods”?

Then there’s Supreme Court Justice Clarence Thomas, a former Monsanto employee – he was a company lawyer. [3] Does a corporate lawyer position warrant enough experience to sit on the U.S. Supreme Court?

The third bulleted item above ought to nail it down for everyone as to what’s really going on. It’s a shame what’s happening in science, the corporate world, and government during these trying times.

However, readers may recall that I wrote “GMOs: What Do the Stars Say Astrologically” back on August 2, 2013. Does astrology know more than we give it credit for?

Another publication, The Economist, also did a number on the apparent unethical retraction, and titled it tongue-in-cheek-like, “Smelling a rat.” [4]

Hopefully, the blatant shenanigans that go on in the name of vested interests to obfuscate serious scientific issues or prevail in control mechanisms that affect everyone’s well-being, e.g., the very food we eat, will turn the tide for consumers understanding GM issues, as it apparently has for those 105 very erudite and courageous scientists. Applause, applause, applause!

Source: Activist Post

Bangkok, Thailand: Mass Mobilization Against Wall Street-Backed Regime



For the second time during recent anti-regime protests, a mass mobilization is planned to begin this Monday, December 9, 2013 at 9:39am at Democracy Monument. Universities across Bangkok are setting times and locations for pre-rally staging. Protesters who individually attended the last mobilization, the largest in modern history, are better organized for this coming Monday - gathering their own smaller groups to join larger staging areas for a mass march across the city.

According to even the Western press, who has thus far attempted to shelter the Wall Street-backed regime, at least 200,000 protesters filled the streets last month, dwarfing entirely anything the regime has ever accomplished even at the height of its popularity. Since then, the regime has used excessive force, made draconian threats, and even unleashed armed militants to create bloodshed - further alienating itself, and galvanizing the Thai people.

Many of the individual pre-mobilizations will be as large as a typical pro-regime rally. These will then march across the city and merge. The last mass mobilization was peaceful, even festive.

This Monday, the message is a non-violent one, for the regime to see and hear the voices of the people who reject it wholly and will no longer comply with its entrenched, abusive power.

Read more »