Zero access Rootkit

Lennart Sorensen lsorense-1wCw9BSqJbv44Nm34jS7GywD8/FfD2ys at public.gmane.org
Tue Nov 26 18:37:04 UTC 2013


On Tue, Nov 26, 2013 at 01:27:08PM -0500, Aruna Hewapathirane wrote:
> Overkill I can live with but if this root-kit trojan has a mechanism that
> actually goes and resides in the BIOS then we are right royally screwed  ?
> And wiping the disk is not going to help ?  In that case flashing the bios
> and in extreme cases actually pulling out and puting the bios chip back is
> the only solution ? So YES agreed it is overkill but liek I said better to
> be safe than sorry with no back up of countless hours of data. ( Yes I had
> to do this long years ago :-)

Always make backups, and if you don't trust the machine you backed up,
only ever restore data files, never executable code (which in the case
of Microsoft products can be difficult given some of their data formats
include executable code in them).

-- 
Len Sorensen
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list