The menace of badBIOS
badBIOS, as its name suggests, infects the computer's BIOS. Once infected, badBIOS embeds malicious code into the operating system. While badBIOS is not the only virus targeting BIOS, it differs from previous viruses which exploited vulnerabilities in software installed on the operating system, such as Adobe Reader or Java browser plugins, to launch attacks. BIOS malware is considered an especially effective tool for attackers due to its ability to conceal itself stealthily, making detection and eradication difficult.
With its unique mechanisms, badBIOS is regarded as a peculiar phenomenon. It has the capability to resist 'eradication' even if someone reinstalls the BIOS firmware and still remains operational thereafter. badBIOS is also platform-independent—meaning it can infect and 'parasitize' various operating systems like Windows, OS X, Linux, or even BSD. According to Ruiu's current theory, badBIOS can spread in two ways: through USB (the traditional method) or by transmitting high-frequency signals to uninfected computers. These signals are then captured by the microphone on the computer and converted into malicious code that spreads throughout the system.
Severe consequences
While it may seem like a virus created for... amusement, if badBIOS is indeed real, it would lead to severe consequences. Ruiu believes that badBIOS is just the first step in a mechanism for loading the next malware. Similar to other malware, badBIOS initially infiltrates the system and then 'calls for help' from a 'command center' to await further instructions. This process, along with the instructions for the malware, can entirely occur although not clarified at the current time.
Once the existence of badBIOS is confirmed, it poses a threat to the security method of isolating computer systems that store important documents not connected to the Internet. This method is predominantly used by government agencies worldwide, especially in the fields of defense and security. Most digital documents categorized as confidential and critically secure are stored on computer systems never connected to the Internet to mitigate the risk of intrusion and theft.
For such isolated systems, the only way to introduce malware is through USB or peripheral storage devices connected to the computer. Even in that scenario, without an Internet connection, the impact of most malware types is nullified. Spyware software like keyloggers needs an internet connection to transmit information back to the center. However, the transmission of high-frequency signals by badBIOS hints at non-traditional, non-transmitted attack methods.
Security expert Robert David Graham of Errata Security states that there are numerous ways to intercept airborne communications. Attackers can exploit LED light signals or monitor the voltage levels on a computer's power supply. Even a standard laptop has many input and output ports that hackers have yet to fully exploit.
Future malware with propagation mechanisms like badBIOS may seem to have severe consequences, but it's still relatively early to worry about that. Understanding the components of malware and their operational mechanisms will help security experts devise methods to defeat them.