NSA hacks are consistent with security researcher Dragos Ruiu's claims about BadBIOS, but too many questions persist Recent revelations about NSA hardware and firmware backdoors gives all the evidence that those who believe BadBIOS Trojans exist need to see. The spying technology has arrived. The only question is if the BadBIOS incident truly happened.To summarize, BadBIOS is the name for a purported superadvanced Trojan that has been battling against disclosure by respected security researcher Dragos Ruiu. Ruiu has reported that the cross-platform Trojan can survive reformattings, communicate using sound waves, and remove itself on the fly during forensics investigations. All those claims are technologically possible but, in my opinion, are unlikely to be come together in one Trojan and are unlikely to be used against Ruiu. Though some people concluded Ruiu was just seeking publicity, I felt Ruiu was misdiagnosing innocuous symptoms as evidence of maliciousness.[ RIP, information security, done in by backdoors and secret deals | InfoWorld’s expert contributors show you how to protect your Web browsers in the “Web Browser Security Deep Dive” PDF guide. Download it today! | Stay up to date on the latest security developments with InfoWorld’s Security Central newsletter. ]A two-week-old LeakSource report makes the case for BadBIOS more plausible. It appears the NSA has many software and firmware/hardware-based modules that can be placed either on devices after those devices are made or can be actually embedded onto the motherboard/circuitboard as a chip or other component. These devices can enable continued, hard-to-discover, unauthorized remote access for NSA monitors. And the behaviors described in the article seem to parallel many of those attributed to BadBIOS. Here are some examples: The NSA’s Ironchef product “provides access persistence” using “a hardware implant that provides two-way RF communication” “by exploiting the motherboard BIOS.” Gourmettrough “is a user configurable persistence implant” for Juniper firewalls. “It persists [another NSA product] across reboots and OS upgrades.” Halluxwater is a “persistence Back Door implant” installed as a boot ROM upgrade on Huawei firewalls. Jetplow is the same thing for Cisco PIX and ASA devices. Loudauto is a small device that picks up room audio, which can then be collected using radar. Nightstand is a “802.11 wireless exploitation and injection tool for payload/exploit delivery into otherwise denied target space.” Ginsu is a PCI card that ensures the reinstall of other implants after physical removal of the other implant. Somberknave “is a software implant that surreptitiously routes TCP traffic from a designated process to a secondary network.”Each “implant” is so devious that it was hard for me to decide what to include or not include as an example in the paragraph above. Many of these devices are intended to be used in combination with each other. Most have apparently been available for many years. You can’t go through the full list without wondering if Ruiu was completely right all along. Have I and other skeptics been too disbelieving? Given just the few dozen devices revealed in the article, you would have to conclude that everything Ruiu has been claiming is possible. Maybe I was wrong!I could be, but I doubt it. First, from the beginning I have stated that nearly everything Ruiu was claiming was possible. But I simply don’t believe Ruiu is a target of the NSA. Why should he be? Ruiu has yet to reveal any reason for why he would be targeted.Now, many readers might argue, correctly, that our intelligence agencies have always spied for obscure reasons (such as the FBI’s surveillance of John Lennon). But if Ruiu thought there was a plausible motive, wouldn’t he offer it up? Maybe some intelligence agency is interested in what he or his partners have learned? Perhaps Ruiu has some insight into one of the NSA’s secret devices? If that seems possible, why not state the hypothesis?The second reason I don’t think BadBIOS is composed of NSA implants is that certainly by now Ruiu would have located any malicious software or hardware implants. Ruiu has openly posted memory dumps and involved many forensic experts in his battle to detect his malicious foe. None of them have found anything out of the ordinary. The NSA may have lots of secret spy devices, but none would be able to hide from thorough examination. You cannot perfectly hide yourself.Lastly, some of Ruiu’s claims, like disappearing evidence, are possible but highly unlikely in light of all the other (non-)evidence. I end with the same conclusion I had the last time I covered this topic. Everything Ruiu claims could be true, but it is the sheer amount of implants that would have to be secreted on all his computing devices, plus the huge fact that no forensic expert has found any evidence that leads me to believe that BadBIOS doesn’t exist.Hang on, let me update that. From the NSA reveal, we’ve learned that many “BadBIOS” implants do exist. I just don’t think Ruiu has one. This story, “NSA’s backdoors are real — but prove nothing about BadBIOS,” was originally published at InfoWorld.com. Keep up on the latest developments in network security and read more of Roger Grimes’ Security Adviser blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe