How can a computer virus be transmitted over the air from machine to machine?

nchristine

I was listening to the radio and heard a report on a new virus that could be transmitted without machines being physically connected. How is this even possible? Is it something to be concerned about at this point?

Topic: Security
Answer this Question

Answers

5 total
ttopp
Vote Up (7)

I think what you may be talking about is badBIOS, since I’ve heard/read a few reports about it in the past week. I assume you meant not on a network, since, as the other poster pointed out, computers are often not physically connected to a network or other device, and WiFi (or other wireless connections) as an attack vector is pretty obvious.

 

There is some dispute whether badBIOS is real or not, but the basic concept is that it uses the microphones and speakers to transmit malicious code between machines that are not networked in any way. In fact, contrary to initial reports that an infected machine could infect a clean one have been amended to say that two infected machines can communicate using frequencies that are inaudible to the human ear, sort of like an ultrasonic version of an old school modem. 

 

Here is a fairly thorough article on infoworld about it. 

Carla Manini
Vote Up (7)

What about Wifi? Mobile Telecom Technologies 3G, 4G? The computers are not physically connected if you're using  these technologies yet you can get infected if you are not careful.

StillADotcommer
Vote Up (6)

There is apparently significant and growing skepticism that badBIOS is real. Other researchers have been unable to confirm the original findings. The original researcher, Dragos Riui, stands by it however. Source: http://arstechnica.com/security/2013/11/researcher-skepticism-grows-over...

jimlynch
Vote Up (5)

Researcher skepticism grows over badBIOS malware claims
http://arstechnica.com/security/2013/11/researcher-skepticism-grows-over...

"Five days after Ars chronicled a security researcher's three-year odyssey investigating a mysterious piece of malware he dubbed badBIOS, some of his peers say they are still unable to reproduce his findings.

"I am getting increasingly skeptical due to the lack of evidence," fellow researcher Arrigo Triulzi told Ars after examining forensic data that Ruiu has turned over. "So either I am not as good as people say or there is really nothing."

nchristine
Vote Up (5)

Hi, and thanks for the responses. I worded my question poorly, I wasn’t thinking about WiFi, 3G, etc as Carla pointed out. It was the badBios malware (or potential malware) that I heard the piece about, I just missed the name. Glad to hear that it probably is not a serious threat. Thanks for the info.

Ask a question

Join Now or Sign In to ask a question.
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and functionality that you're not familiar with. Don't sweat it: We're here to help. We've collected some of our favorite and most useful tips and compiled them here, just for you.
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+