A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #21969  by itbwcki
 Fri Jan 17, 2014 10:13 am
Is there any documented case of firmware malware, given the TAO revelations?
You can read the entry here:
http://www.rootwyrm.com/2014/01/dismant ... s/#respond

Key summary in my opinion:

"So no. They’re still not infecting the BIOS. Most Ethernet MACs have burst writable (meaning: can be written to during normal operation) flash, as do many USB controllers and so on. These parts are very hard to forensically inspect because the storage is on the die and accessed via on-die controllers. Operations to and from these devices are not checked for safety or security because of the difficulty and performance impact – they just have to be assumed as “safe.” That’s where the initial payload resides and execute from."

Could an antimalware still detect something like this? They are detecting the very few BIOS malwares out there.
 #21983  by EP_X0FF
 Sat Jan 18, 2014 4:18 am
This kind of hardware strictly related stuff is only can be good for APT (for a some reason even here is simpler and effective use much more primitive things) not for malware as we know it.