pastebin - collaborative debugging tool
kpaste.net RSS


#badbios - probing for deeper looks at
Posted by Anonymous on Fri 6th Dec 2013 11:01
raw | new post

  1. #badbios - probing for deeper looks at
  2. ------------------------
  3. @Clive Robinson
  4.  
  5. A lot of people are wondering why dragosr was the only one to run across this malware. In fact, he wasn't. The people who were before him were mocked and most threads closed and either deleted or shuffled to areas of message boards where Joe Q public couldn't see it and question this for themselves. [some] Major Anti-Virus companies included.
  6.  
  7. Users didn't want to know, companies didn't want to know. Unless you were "known" in the field, like dragosr, and even then, you are handled like you may be retarded or just need a vacation.
  8.  
  9. Here is one of dozens of reports:
  10.  
  11. LCD Monitor Broadcasts Noise To Radio! Why? (FRS)
  12. http://forums.radioreference.com/computer/255488-lcd-monitor-broadcasts-noise-radio-why.html
  13.  
  14. Final post in that thread:
  15.  
  16. "BOTTOM LINE: No matter WHAT you do, all devices that use electricity will emit some sort of interference in the air and there's nothing you can do about it without unplugging/turning it off. "
  17.  
  18. including:
  19.  
  20. "Have you noticed any nondescript white vans or black helicopters in your neighborhood?
  21.  
  22. What do you do or have you done to make "them" take such an interest in you that "they" have to bug you?
  23.  
  24. You need a bigger tinfoil hat, perhaps a full body suit."
  25.  
  26. Another thread:
  27.  
  28. Gpu based paravirtualization rootkit, all os vulne
  29.  
  30. http://forum.sysinternals.com/gpu-based-paravirtualization-rootkit-all-os-vulne_topic26706.html
  31.  
  32. This:
  33.  
  34. U.N. report reveals secret law enforcement techniques
  35.  
  36. "Point 201: Mentions a new covert communications technique using software defined high frequency radio receivers routed through the computer creating no logs, using no central server and extremely difficult for law enforcement to intercept."
  37.  
  38. http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
  39.  
  40. http://www.hacker10.com/other-computing/u-n-report-reveals-secret-law-enforcement-techniques/
  41.  
  42. I think this is something which has been brewing for years, but "forces" beyond our sight have managed to stifle any serious investigation into the technology. Some have announced they are retreating to ancient technology of the 70's and 80's, others are looking towards open source hardware and software combinations.
  43.  
  44. Is it time Wireshark included audio monitoring as well? Off to play with a recording device and Audacity.
  45.  
  46. https://www.schneier.com/blog/archives/2013/11/friday_squid_bl_402.html#c2751193

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}





All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at