Home Business IT Security New generation malware for PCs and routers could be very persistent

Security researchers warn that the firmware in PCs and routers could be subverted for nefarious purposes.

Malware for PCs is an established part of life. Keeping the operating system and applications up to date helps (a vulnerability that's been removed can't be exploited), as does decent security software.

And if the worst comes to the worst, there's always the possibility of completely wiping the hard drive and starting from scratch.

But a security researcher has shown that a small malware loader can be concealed in the BIOS or other firmware built into a PC.

If multiple pieces of firmware (eg in the network card as well as the BIOS) were subverted in this way, the malware could even survive replacement of the BIOS.

Jonathan Brossard demonstrated this approach at the recent Black Hat conference in the US. The routine hidden in the BIOS connects to a remote server to fetch the code that does the dirty work.

Unlike conventional malware, this leaves no trace on the hard drive for later analysis as the rogue code is freshly downloaded each time.


Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.