Have USB flash drive with UEFI, "gapless" rootkit

nn67p@outlook.com

Beta member
Messages
1
Location
Belleville, IL
Hello,

I apologize if this is in the wrong forum - if so, please move. But I thought this was a little more serious than "malware."

I am looking for a verifiable security firm - if not one of the larger ones, or advice on how to reach them.

I have a USB flash drive with a copy of what appears to be a "gapless" UEFI rootkit ie. "Badbios" that can use a number of exploits to make an end run around Windows 8 and Windows 10 app signing, and various AV to install unsigned Windows drivers, sometime after which it takes over the I/O controller intercepting commands to the disk, and infecting as much firmware as it can: video card, touchscreen, etc. And yes, it exploits the Intel vulnerability unveiled at Blackhat.

It appears to be gapless. After burning through many home PCs, and many exchanged ones, I exchanged yet again for a Dell Inspiron 23 'all-in-one' touchscreen model today (8/18/2015.)

At this large national brick-and-morter retailer, I was allowed to fortify it with the latest Dell patches to everything including SATA, and the Intel Chipset (driver dated July 31) I installed a variety of anti-malware and saved various errors and Windows 8.1 event logs as I went.

Somewhere along the way, this rootkit (seems to have) jumped from my Apple 6 Plus in my pocket to said PC right there in the store. As stated above, it took over the i/o controller and UEFI, the touchscreen and video card firmware. It may be elsewhere.

I give in. I am an IT professional with 17 years of experience as a Windows Systems Admin (with emphasis on VMware) and have a pretty good grasp of the network side of things - switch config, firewall, routers, TCPIP routing etc. I am more than willing to hand this over to the right individuals at a verifiable security firm in exchange for help, or only if to give the security community more information about what hit me.

This infected my system from a personal USB flash drive that I have been very careful with, but that had the rootkit added by individuals (I cannot go into specifics here) in which I held a trust. Nothing illegal, hacking or otherwise, just a trust. I am an average Windows Sysadmin who has had to ramp up very quickly on forensics, rootkits, etc.

Again, I have the USB drive and/or can provide a BIN image of the drive imaged with Recurva or the delivery method of your choice.

I have collected everything I can think of to collect, and indeed, have a number of infected systems and top end Linksys WRT router.

Anyone with advice on my statement above that is in bold please contact me. I have allowed my forum profile to allow you to send me email directly.

This will all come out in time, and I'll leave it to Infosec professionals to release that info as I, again, am not a Infosec pro.

Thank you.
 
Not sure who you would contact myself.

This is the first I've heard of BadBIOS being actively used in the wild - are you sure it's that? I'd think it'd be more along the lines of BadUSB (source code is available on GitHub in fact) which is used to infected flash drives at the controller / firmware level and spread payloads that way. You can see how it works here: https://github.com/adamcaudill/Psychson

As for recovering from it...not sure other than possibly reflashing the controllers/firmware of each device to rewrite the firmware in it's entirety.
 
I'd chime in with more substance too, but this sounds a bit too hefty for someone with no real-world professional experience to touch, but I know there's plenty at AskNetsec.
 
Okay, I got in touch with Keith at Webroot. He said the easiest way to submit the sample is via their software's interface. You can download a trial copy and submit it that way. It will go directly to them. If they require additional information, they will contact you. Here's the link for you: AntiVirus Free Trial - Free Malware Scan | Webroot

I'm curious about the turnout on this. Keep me posted.
 
Back
Top Bottom