The New BIOS Hack That Bypasses Every Antivirus

ThioJoe
9 Mar 202412:15

Summary

TLDRLogoFail is a recently discovered collection of exploits targeting computer BIOS firmware, making traditional malware removal methods like hard drive wiping ineffective. It exploits vulnerabilities in the image parsers used by BIOS software companies to load manufacturer logos, allowing malware to embed itself into the firmware. This firmware-level malware can reinstall malicious files or run processes invisible to the operating system. While Macs and certain Dell and MSI devices are immune, most PCs are potentially vulnerable. The only surefire solution is to update the BIOS with the latest firmware from the manufacturer. The exploit has not been used actively yet, but the risk is real, prompting users to consider BIOS updates to safeguard against this threat.

Takeaways

  • 💻 A new exploit called LogoFail targets computer's BIOS firmware, making it extremely difficult to remove.
  • 🚨 Firmware-level malware is like the 'final boss' of malware because it's embedded within hardware and not stored on the drive.
  • 🛑 LogoFail allows malware to infect firmware, leading to potential undetectable and persistent malicious activity.
  • 🖼️ The exploit involves manipulating the image parsers used by BIOS to display manufacturer logos during startup.
  • 🔍 Secure Boot technologies typically do not check image files, allowing this exploit to bypass security measures.
  • 🔗 The malicious code can be introduced through various attack vectors, including remote hacking and physical access.
  • 🍎 Macs, certain Dell devices with Intel Boot Guard, and some MSI motherboards are not vulnerable to LogoFail.
  • 🆘 Updating BIOS to the latest firmware is the recommended solution to protect against LogoFail, if available from the manufacturer.
  • 🛠️ BIOS updates should be performed with caution to avoid causing severe system issues.
  • 📢 As of the knowledge cutoff, there have been no active uses of LogoFail, but vigilance is advised.

Q & A

  • What is the main vulnerability discussed in the transcript?

    -The main vulnerability discussed is LogoFail, a collection of exploits related to computer's BIOS firmware that allows malware to infect the firmware itself.

  • How does firmware-level malware differ from regular malware?

    -Firmware-level malware is embedded within the hardware itself and is not stored on the drive, making it more difficult to detect and remove compared to regular malware, which typically installs itself in the operating system or files.

  • What is the role of BIOS in the context of malware?

    -BIOS, or Basic Input/Output System, is stored on a physical chip on the motherboard and runs before any other software, including the operating system. If the BIOS firmware is infected by malware, it can execute malicious code before any security measures are in place.

  • How does the LogoFail exploit work?

    -LogoFail exploits involve the manipulation of the image parsers used by BIOS software to load manufacturer logos during startup. Malicious image files can trick the BIOS into executing additional code, leading to firmware infection with malware.

  • What is Secure Boot and how does it relate to LogoFail?

    -Secure Boot is a technology designed to ensure that BIOS data is not manipulated during startup. However, it does not typically check image files, which is how the LogoFail exploit is able to bypass these security measures.

  • What are the three main attack vectors for LogoFail?

    -The three main attack vectors are: 1) Replacing the logo file in the EFI System Partition, 2) Using a malicious BIOS update file, and 3) Physically accessing the computer with a SPI Flash Programmer to replace the file directly in the hardware.

  • Which types of computers are not vulnerable to LogoFail?

    -Apple Silicon Macs and Intel-based Macs are not vulnerable because they either do not use UEFI or have the image hard-coded with checks. Some Dell devices with Intel Boot Guard configured to check the image are also safe, as are MSI motherboards that do not allow user changes to the logo.

  • How can you protect yourself from the LogoFail exploit?

    -The primary method of protection is to update your BIOS to the latest firmware version, which should include patches for the LogoFail exploit. Users should check their system manufacturer's website for updates and follow instructions carefully to avoid issues during the update process.

  • What is the significance of the LogoFail exploit in terms of cybersecurity?

    -The LogoFail exploit is significant because it represents a fundamental vulnerability at the firmware level, which is difficult to detect and remove. It highlights the need for constant vigilance and the importance of keeping system firmware up-to-date to counter emerging threats.

  • Are there any known active uses of the LogoFail exploit?

    -As of the knowledge in the transcript, there have not been any reported instances of the LogoFail exploit being actively used in the wild. However, the potential for such attacks exists, and users are advised to take preventative measures.

  • What is the role of the sponsor, Aura, in the context of the video?

    -Aura is a sponsor of the video, offering a suite of cybersecurity services including antivirus, VPN, password management, and identity theft insurance. The video suggests using Aura to protect personal data, which can be a target for hackers alongside system vulnerabilities like LogoFail.

Outlines

00:00

💻 The Emergence of Firmware-Level Malware: LogoFail

This paragraph introduces the concept of firmware-level malware, specifically the LogoFail exploit, which targets the BIOS firmware of computers. It explains that unlike regular malware, firmware-level malware is extremely difficult to remove because it is embedded within the hardware itself. The paragraph also provides a brief overview of how traditional malware operates compared to the more insidious nature of firmware-level attacks, which can reinstall malicious files or go undetected by the operating system.

05:00

🔍 Exploring the Attack Vectors of LogoFail

This section delves into the three main methods by which the LogoFail exploit can infect a computer's firmware. It discusses how malware can replace the logo file through the EFI System Partition, a malicious BIOS update file, or physically with a SPI Flash Programmer. The paragraph emphasizes that only Macs and certain Dell devices with specific security configurations are immune to this exploit, while most other systems are potentially vulnerable.

10:02

🛠️ Protecting Against LogoFail: Updates and Precautions

The final paragraph focuses on the steps users can take to protect their computers from the LogoFail exploit. It suggests updating the BIOS to the latest firmware as the most effective solution, provided by the system or motherboard manufacturers. The paragraph also cautions about the risks of BIOS updates and advises users to follow manufacturer instructions or seek help from knowledgeable individuals. It concludes with a call to action for viewers to share their thoughts on the matter and to utilize the sponsor's services for data protection.

Mindmap

Keywords

💡LogoFail

LogoFail is a term used to describe a collection of exploits related to computer BIOS firmware. It is a significant security concern because it allows malware to infect the firmware, which is embedded code within hardware and is not stored on the drive. This makes it incredibly difficult to remove the malware, as traditional methods like wiping the hard drive are ineffective. The exploit was discovered by the company Binarly, and it leverages vulnerabilities in the image parsers used by BIOS software companies to load manufacturer logos during system startup.

💡BIOS firmware

BIOS (Basic Input/Output System) firmware is the embedded code stored on a physical chip on the motherboard that initializes the hardware components of a computer during startup. It is a crucial part of the system as it runs before the operating system, making it a prime target for malware. In the context of the video, the BIOS firmware is vulnerable to the LogoFail exploit, which can lead to persistent and hard-to-remove malware infections.

💡Firmware-level malware

Firmware-level malware is a type of malicious software that infects the firmware of a device, such as a computer's BIOS or UEFI (Unified Extensible Firmware Interface). This type of malware is particularly dangerous because it operates at a level below the operating system, making it invisible to most security measures and difficult to remove. It can persist even after the hard drive is wiped clean, as it is not stored on the drive but in the hardware's firmware.

💡Secure Boot

Secure Boot is a security feature designed to ensure that the BIOS data is not manipulated during startup. It verifies that the firmware and other system software components are loaded from trusted sources by checking their digital signatures. However, the video points out that Secure Boot may not check all parts of the EFI partition, such as the logo image files, which can be exploited by malware like LogoFail.

💡EFI System Partition

The EFI System Partition (ESP) is a small partition on a hard drive that stores firmware-related data, including boot loaders for multiple operating systems and, in some cases, manufacturer logos. It is used by systems with UEFI firmware, which is an advanced version of the traditional BIOS. The video explains that malware can exploit vulnerabilities in the EFI partition to replace the logo with a malicious version, leading to a firmware infection.

💡Malware

Malware, short for malicious software, is any software intentionally designed to cause damage, collect sensitive information, or disrupt system operations. In the context of the video, malware refers to the threats posed by the LogoFail exploit, which allows for the installation of persistent firmware-level malware that cannot be removed by simply wiping the hard drive.

💡Rootkits

A rootkit is a type of malicious software that provides the attacker with unauthorized access to a computer or network by masking its existence and the activities conducted by the intruder. Rootkits are particularly dangerous because they can hide deep within the operating system and are difficult to detect and remove. They often load before the operating system, allowing them to control system functions and cover their tracks.

💡Fileless malware

Fileless malware is a type of malicious software that resides in the computer's memory rather than on the hard drive. It executes directly in RAM and typically runs as a script or process that starts with the operating system. Because it does not leave files on the disk, it is harder to detect with traditional antivirus software and can be more persistent even after system reboots.

💡Aura

Aura is a cybersecurity software suite mentioned as a sponsor in the video. It offers a range of features designed to protect personal data and secure online activities, including antivirus protection, VPN services, password management, and identity theft insurance. The software aims to safeguard users from data breaches and cyber threats by providing a comprehensive security solution.

💡Intel Boot Guard

Intel Boot Guard is a security technology designed to protect the integrity of the BIOS firmware during the boot process. It ensures that only trusted and verified firmware updates are applied to the system. Some Dell computers use a special configuration of Intel Boot Guard that also checks the image portion of the firmware, making them less vulnerable to certain types of firmware-level malware, like the LogoFail exploit.

💡Binarly

Binarly is a company that specializes in firmware security research. In the context of the video, Binarly discovered the LogoFail exploit, which highlights vulnerabilities in the image parsers used by BIOS software companies. This discovery has significant implications for computer security, as it exposes a new way for malware to infect firmware that is difficult to detect and remove.

Highlights

A new exploit called LogoFail has been discovered that affects computer's BIOS firmware.

LogoFail is a collection of exploits related to BIOS firmware, making traditional virus removal methods ineffective.

Firmware-level malware is like the 'final boss' of malware because it's embedded within hardware and not stored on the drive.

Malware can reinstall malicious files or start processes invisible to the operating system, if it infects the firmware.

The LogoFail exploit allows malware to infect firmware by manipulating the BIOS chip on the motherboard.

Binarly, a company, discovered that image parsers used by BIOS software companies have many exploits.

Malware can trick the BIOS into loading an image file that contains malicious code, leading to firmware infection.

Secure Boot technology, designed to prevent BIOS data manipulation, often does not check image files, allowing this exploit to occur.

Personal data is vulnerable to exploitation, which is where the sponsor, Aura, steps in to protect user information.

Aura helps protect personal data, reduce spam, and guard against hackers using personal information for phishing attacks.

Malware can replace the logo file in the EFI System Partition, which is usually protected but has unsigned blocks that can be exploited.

Two of the three main attack vectors for LogoFail do not require physical access to the computer, unlike the third method which involves a SPI Flash Programmer.

Macs, certain Dell devices with Intel Boot Guard, and some MSI motherboards are not vulnerable to LogoFail.

The best way to protect against LogoFail is to update the BIOS to the latest firmware, which should patch the exploit.

BIOS updates should be done carefully to avoid causing severe system issues.

ASUS and Gigabyte have released BIOS updates specifically mentioning the patch for the LogoFail exploit.

There have been no known active uses of LogoFail, but it's important to be aware and take preventative measures.

Users are encouraged to update their BIOS or seek help from someone knowledgeable to mitigate the risk of LogoFail.

Transcripts

play00:00

Imagine a computer virus that you cannot remove even by wiping a hard drive completely or

play00:05

removing it all together.

play00:07

Surely that can't be possible, right?

play00:09

Well, you might want to sit down for this one.

play00:11

There is a recently discovered exploit, it was discovered a couple months ago, that your

play00:16

computer is very likely to be vulnerable to.

play00:18

It's being called LogoFail, and it actually is a collection of several exploits having

play00:24

to do with your computer's BIOS firmware.

play00:26

To understand what the big deal is, let me give you a quick primer on firmware-level

play00:30

malware, which is kind of like the big final boss of malware.

play00:34

You see, regular malware and viruses, we kind of all know how they work.

play00:38

They usually install themselves and embed themselves in the operating system or in some

play00:42

files, that gets autorun when the computer starts up, and then does whatever, tracking

play00:47

or stealing.

play00:48

If there's different levels of ways these viruses hide themselves, for example, rootkits

play00:52

might literally be starting up before anything else in the operating system, so it can't

play00:57

really be detected.

play00:59

Or fileless malware is another example where it doesn't even have any files themselves

play01:04

on the drive, it kind of runs as a script that starts a process along with the operating

play01:09

system.

play01:10

But at the end of the day, you could wipe the drive and get rid of these.

play01:13

But the firmware, which is like embedded code within hardware itself, that is not stored

play01:19

on the drive anywhere.

play01:20

For example, we've all probably heard of the BIOS.

play01:22

These days, it's technically the UEFI, but everyone calls it the BIOS, that's what I'm

play01:26

gonna call it.

play01:27

Anyway, that is gonna be stored on a physical BIOS chip on the motherboard, and that's why

play01:32

it can run even if there's no drive installed on the computer.

play01:36

So in cases where the firmware is infected by malware, because that firmware code gets

play01:41

loaded before any other software, the operating system, drivers, anything else, then there's

play01:46

literally nothing that can stop it.

play01:47

It can do anything from reinstalling malicious files onto the drive repeatedly every time

play01:53

at boot up, or starting a process that is malicious that the operating system can't

play01:59

even see it all, therefore you can never detect it.

play02:02

And unfortunately, this LogoFail set of exploits does allow malware to infect the firmware

play02:08

itself.

play02:09

So first, let me give you a quick overview of how this LogoFail thing works and why it's

play02:12

so bad, and then I can go into a bit more details.

play02:15

So you know when you boot up your computer, you're usually gonna see a logo of some kind.

play02:19

Maybe it's the manufacturer of the motherboard, or if it's a branded computer, you'll see

play02:24

the computer manufacturer logo comes up.

play02:27

And also, oftentimes, the BIOS may allow a user to actually customize what logo shows

play02:32

up, what image does.

play02:33

Well turns out, a company called Binarly discovered that the image parsers, which is like the

play02:39

bits of software that loads these images, they apparently have lots of exploits, and

play02:45

they're used by basically all the BIOS software companies.

play02:48

And the big takeaway is that a bad actor could create image files, regular image files, that

play02:54

are encoded in such a way that when the bits of software load the image onto the BIOS,

play03:02

it can trick it into doing a lot more stuff, including just rewriting the firmware to have

play03:07

malicious code in there and doing whatever they want.

play03:10

And the reason this is especially bad is because, yes, there are actually technologies, such

play03:14

as Secure Boot, that are specifically designed to ensure that BIOS data is not manipulated

play03:22

on startup.

play03:23

But apparently, they do not usually check the image files, which is how this is allowed

play03:29

to get through.

play03:30

So what would happen is you'd get infected with malware one way or the other, usually

play03:34

the typical way you download a file unknowingly.

play03:36

And instead of running a stealer or installing pop-ups or whatever, it will replace the image

play03:43

that gets loaded by the BIOS, and then your firmware is hacked.

play03:47

And then literally nothing will be able to detect it.

play03:49

Before I get into the details though, something else that's vulnerable is your personal data,

play03:53

which is where today's sponsor comes in, Aura.

play03:55

Sketchy data brokers out there collect and sell your information to scammers, spammers,

play04:00

and anyone else who may want to target you.

play04:01

I'm talking about your full name, email, home address, health records, your relatives.

play04:06

It's all out there.

play04:07

But that's where Aura comes in.

play04:08

For example, it can show me which data brokers are selling my info, and automatically submit

play04:13

opt-out requests for me.

play04:14

Cleaning up all this info not only reduces the amount of spam coming my way, but protects

play04:19

me from hackers who might leverage this info to try and access my accounts, or even send

play04:24

personalized phishing attacks.

play04:26

I was even surprised when it showed me that the collected public info out there even included

play04:31

what kind of car I drive.

play04:32

I was not expecting that.

play04:34

But Aura also has a ton of other features, such as antivirus, a VPN, password management,

play04:39

parental controls, even identity theft insurance, all in one place, instead of needing a bunch

play04:44

of separate apps.

play04:45

And even if you have one or two of these tools already, you could be still leaving doors

play04:48

open to bad actors.

play04:50

But Aura is always on, so you can have peace of mind and focus on the other important stuff.

play04:55

To get started and protect your info, you can go to Aura.com/ThioJoe to start your two-week

play05:00

free trial.

play05:01

Link is also in the description.

play05:03

And with all that being said, let's continue.

play05:05

So in terms of more details about how the malware actually replaces the logo file, there's

play05:10

three main attack vectors that they could choose to use.

play05:13

And importantly, for two of these, it does not require the attacker to have physical

play05:18

access to your computer.

play05:20

It can be remotely hacked, like any other virus.

play05:23

So I've seen people say, "Oh well don't worry, they have to have physical access to your

play05:26

computer."

play05:27

No, they do not.

play05:28

The first strategy they can use is to replace the file in the so-called EFI System Partition.

play05:33

You see, these days, the UEFI, which is basically like an advanced version of the old BIOS,

play05:38

but people still call it the BIOS.

play05:40

Anyway, in addition to having the firmware, which boots up and can do stuff, they also

play05:45

usually load supplemental data onto the hard drive in a special EFI partition.

play05:52

It's very small, about a hundred megabytes.

play05:54

And this will contain info about how to boot individual operating systems.

play05:59

So if you have a multi-boot system, usually it's all going to be stored in one place.

play06:03

And this EFI partition will have stuff like the boot loaders for the operating systems,

play06:08

but may also contain those logos.

play06:10

So what happens is you get some kind of malware that infects your computer, and either by

play06:15

tricking you into running it as admin, or it does a privilege escalation attack, it

play06:21

gets the ability to simply write the malicious image file to this EFI partition.

play06:27

So it's literally just a matter of copying a file over.

play06:30

So what happens is the BIOS on startup will see that logo and load it, and try to display

play06:37

it, but it has that malicious code, and then it'll manipulate the BIOS firmware, so it

play06:42

doesn't even need that logo again to run.

play06:46

It'll already be embedded in the firmware, and that's why if you erase the drive, it

play06:50

doesn't help anymore.

play06:51

Now, typically this EFI system partition is protected by something like Secure Boot.

play06:56

That's what it does.

play06:57

It makes sure that none of these files are manipulated, different than the officially

play07:01

signed versions.

play07:02

But apparently it turns out that there are sections of the EFI partition that are not

play07:08

checked.

play07:09

They're part of unsigned blocks.

play07:10

So it doesn't check everything.

play07:11

Apparently the logo is part of that oftentimes.

play07:14

Next, the second attack vector would be through a malicious BIOS update file.

play07:19

So usually a computer is going to have a way where the user can update a BIOS file one

play07:25

way or another.

play07:26

And sometimes this even includes a tool that allows you to take a firmware update file,

play07:33

and run it from within the operating system.

play07:35

As it's already running, you don't even have to reboot, and it'll update the firmware directly

play07:39

from within the OS.

play07:40

And usually this isn't really a problem security-wise, because the existing BIOS will check that

play07:45

the new BIOS file is signed correctly, and hasn't been tampered with, and then only will

play07:51

it install.

play07:52

But again, apparently part of these files are not actually checked, and don't have to

play07:56

be signed, including a logo file.

play07:59

So what malware could do is take a legitimate BIOS update file, and replace the part that

play08:06

doesn't get checked, and replace that image file only in that part.

play08:10

So the actual code part, which used to be assumed to be the only part that matters security-wise,

play08:17

it won't be changed, and the BIOS will load everything from that file, including the image,

play08:22

and then that's when it'll get infected.

play08:24

Now there is a third attack vector that does actually require using physical access.

play08:30

And in that case, we'd use something called a SPI Flash Programmer, where you literally

play08:34

connect pins and stuff.

play08:36

That is pretty advanced.

play08:37

In that case, you'd go directly to the hardware level and replace the file in there.

play08:42

That's probably not going to happen usually.

play08:44

And if someone has physical access to your computer, you're kind of screwed anyway.

play08:47

But it is an option nonetheless.

play08:49

Now I'm sure at this point most of you are wondering how you can tell if your computer

play08:52

is vulnerable, and what you can do to protect yourself.

play08:55

And first of all, it's probably easier to go over who is not vulnerable.

play08:59

First of all, Macs are not vulnerable.

play09:02

Even Intel-based Macs are not.

play09:03

That's because the Apple Silicon Macs don't use UEFI at all, and the Intel-based Macs

play09:10

have the image hard-coded in such a way that there is a check including on the image, so

play09:15

you can't replace it.

play09:16

Next, there are some Dell devices that are apparently not vulnerable because they use

play09:20

an additional type of technology, not Secure Boot, but it's called Intel Boot Guard.

play09:25

Which actually is supported on most computers, but Dell has it configured in a special way

play09:31

where it also checks the image portion, whereas for a lot of computers, even if it does have

play09:38

Intel Boot Guard, they don't check the image.

play09:40

So apparently a lot of Dell computers are safe because it is covering the image.

play09:45

Next, from what I've read, MSI motherboards are also not vulnerable because they don't

play09:49

allow the user to change the logo, and the logo is included as part of the signed block

play09:56

of Intel Boot Guard.

play09:57

Although I haven't been able to find any official confirmation from MSI about this.

play10:02

And then again, MSI did have their Intel Boot Guard hardware keys leaked last year.

play10:07

So I mean, it's still better than nothing I guess.

play10:10

In any other cases besides those though, it is probably good to assume that you are vulnerable.

play10:15

The good news is that as far as I know and have read, there haven't been any instances

play10:21

of this being actively used yet, but that doesn't mean that it won't be.

play10:25

And as for how to protect yourself, well, really the only true solution is to update

play10:30

your BIOS to the latest firmware, assuming that your system manufacturer created a BIOS

play10:35

update to cover this.

play10:37

By now, most motherboard and system manufacturers should have released a BIOS update if they

play10:44

were going to on more recent software.

play10:46

They said typically by early Q1 2024.

play10:49

Though again, for older systems, they might take longer if they're going to do it at all.

play10:53

For example, if you look at recent BIOS updates from ASUS and Gigabyte, they specifically

play10:59

mention these BIOS updates as patching the LogoFail exploit.

play11:03

So that's something you would want to look for for your system.

play11:06

Although you always do have to be cautious when updating the BIOS, if you screw it up

play11:11

like turning off the computer in the middle of it, it could really mess up your system.

play11:16

So if you really don't know what you're doing, maybe just look on the manufacturer's website,

play11:20

see if they have any detailed instructions on how to do it, or maybe ask one of your

play11:25

friends who's good with computers to do it.

play11:27

It's not super tough, but it's just that if it does go wrong, it can go really wrong.

play11:32

So yeah, it's pretty scary and especially that not a lot of people probably know about

play11:36

this, but at least now you do and you can potentially address it.

play11:39

So I would be curious to know what you guys think.

play11:41

Are you going to bother updating the BIOS or just take the risk?

play11:44

We can just talk about that down in the comments.

play11:46

Thanks again to Aura for sponsoring this video.

play11:49

If you want to protect your data and take advantage of all the other features it has,

play11:52

go to Aura.com/ThioJoe for a two-week free trial, link in the description.

play11:57

So if you enjoyed this video, be sure to give it a big giant thumbs up for the YouTube algorithm.

play12:00

And if you want to keep watching, I made a video recently about some very tricky malware

play12:04

techniques hackers are using to even target programmers and Linux users.

play12:08

Usually you think they're pretty safe, but no.

play12:11

So I'll put that link right there you can click on.

play12:12

Thanks so much for watching and I'll see you in the next one.

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
LogoFailBIOS VulnerabilityFirmware MalwareSecure BootData ProtectionAura SponsorshipTech SecurityHardware HacksSoftware Updates
Besoin d'un résumé en anglais ?