The only 2 users of temple OS can breath a sigh of relief now.
@buckbreaker5185Ай бұрын
@snowflakemelter7171 >he doesn't use Temple OS as a daily driver Couldn't be me.
@LinetteTheAssetАй бұрын
AMEN BROTHER 🐘
@xlmaoАй бұрын
if you trust nobody, not even your shadow, nobody, I REPEAT, nobody can trick you
@rayaanansari4834Ай бұрын
Are we not going to talk about the fact that they got 3rd place and only $100 for this?
@ASTH-yf9uuАй бұрын
For real, these competitions are just to steal from the winner
@aahh437Ай бұрын
wtf, no way
@TheVexCortexАй бұрын
I wanted to see what earned first and second place... Can't find anything about the program...
@huuhhhhhhhАй бұрын
FFS
@real_xijinpingАй бұрын
@@TheVexCortexProbably just some crap "AI" model stole from GitHub. I've attended a number of hackthon and most of them are just shameless bullshitting competitions.
@megadjc192Ай бұрын
This isn't really a linux security issue but a generic security flaw in the uefi that has already been patched for a large number of systems. So this is nothing new. I think the more subtle point of this video is more about linux not being inherently more secure than windows if precautions aren't taken and vigilance not maintained.
@dont.beknown5622Ай бұрын
I'm still confused on how you would "accidentally" get this onto your system. Most of the security issues require some pretty stupid actions on the part of the user - or physical access to the machine.
@gramferoАй бұрын
@@dont.beknown5622the least secure part of any computer is usually sitting between the screen and the chair
@mz00956Ай бұрын
@@dont.beknown5622 Never underestimate the capabilities of the security problem 30cm infront of the screen
@gurbuz12345Ай бұрын
@@dont.beknown5622 Simple, you can install it as a "software" from outside/user repos.
@ThatYahooАй бұрын
@@dont.beknown5622 Have you heard of an Evil Maid Attack?
@augustday9483Ай бұрын
As Linux continues to gain popularity for desktop use, I anticipate we'll start to see more genuine malware targeting common distros. Suffering from success.
@AmalingАй бұрын
Luckily by then I will be using my own abomination fork of my common distro of choice in the future
@DreadHalfling9Ай бұрын
@@Amaling and its gonna be more secure? 😅
@iamwitchergeraltofrivia9670Ай бұрын
@@augustday9483 or buying amd cpu is more secure on linux with Memory encryption
@boatunsoldАй бұрын
that's when we are moving to bsd and haiku
@rogerss1Ай бұрын
Anyone who leaves systemd vulnerabilities in place deserves what they will get.
@pommy_the_mimicАй бұрын
Actually, this could be quite useful. I have some old cisco servers that refuse to boot because they don't have a good signature and it's impossible to turn off secure boot (thanks cisco). This is intentional and is confirmed on their forums. I'd really like to bypass secure boot somehow and use these servers some day
@ferececeАй бұрын
yep, kinda like mtkclient
@christopherg2347Ай бұрын
Jailbreak your Ciscos?
@kstergiou3Ай бұрын
Get them cisco bastards
@Raspredval1337Ай бұрын
based malware 😎
@ShirokoCyclingАй бұрын
@@pommy_the_mimic Cisco SUCKS! I'm glad EFI secure boot is being researched like this, we need to be able to bypass secure boot on the upcoming Windows 365 Link device.
@t74devkwАй бұрын
Legacy BIOS gang, how we doing? 😎
@idkwhatwritehere000Ай бұрын
please just give me some money
@ShirokoCyclingАй бұрын
i7-980X! Still alive.
@chucky29949Ай бұрын
We chillin :)
@nxx99Ай бұрын
Fine, brother!
@Pepo..Ай бұрын
gotta patch it ourselves.
@lambchomp1472Ай бұрын
Using Secure Boot with Nvidia and other propriety drivers can be a PITA, so most people don't use it to begin with. A lot of Linux users are vulnerable to this type of attack.
@jeverett0902Ай бұрын
Signed Nvidia drivers are pretty sweet in Fedora 41, finally.
@unconnectedbednaАй бұрын
1. I patched my system IMMEDIATELY in Januari of 2024 2. The img in my boot sequence is disabled. I think I'm good...
@dnman192Ай бұрын
@marbens I haven't got around to doing on my Lenovo laptop because I'd have to reinstall Windows again. It's almost like Windows is more secure than Linux in this area unless you spend a lot of effort.
@andmoreagainАй бұрын
i hate AI generated images so much its unreal
@RolandfartАй бұрын
well with the release of sora you'll be watching ai generated videos from now on! A whole new dimension of uncanny!
@SockTatersАй бұрын
Same. Why not draw a pretty little picture? Doesn't even have to look good, just not nauseate the audience like AI crap
@bacalhau_secoАй бұрын
same
@inverlockАй бұрын
@@SockTaters agree. shitty mspaint is way more entertaining and endearing than ai images.
@halfsineАй бұрын
what? you're telling me that you don't like art being replaced with soulless images generated by an ai? how dare you!
@jordanmatthew6315Ай бұрын
Bruh, when i have my x86 assembly book, still with me from uni, and hearing about this; it is insane how small memory reallocation is needed to fool certificates. Holy shit, wow.
@TibAverusАй бұрын
Not even IF, but WHEN this gets more popular, this will be an absolute nightmare to deal with for a lot of people.
@Dave_ParrottАй бұрын
I give it a week.
@ASTH-yf9uuАй бұрын
They will hotfix the bmp lib and it will be over, I hope
@PtolemyPetrieАй бұрын
You can just clear the CMOS jumper and or pull the CMOS battery to restore the firmware, it's not that serious.
@nadtzАй бұрын
@@PtolemyPetrie I hope this is a troll post.
@odnxАй бұрын
im still using an asrock am4 board from 2018 that already patched logofail in january
@Chuck8541Ай бұрын
Geez. I'm gonna go back to filing cabinets, and cathode ray tube televisions. Life was easy.
@prophetzarquonАй бұрын
My IBM PS/2 286 still works great
@contradictorycrow4327Ай бұрын
How will you get the data onto paper? Printer spool virus vulnerability?
@RossBradley-vd5rcАй бұрын
@@contradictorycrow4327 Type writter
@szaszm_Ай бұрын
Feels like a nothingburger. LogoFAIL is a previous vulnerability, and as soon as you have rights to install a new bootloader AND you can enroll keys, all bets are off. Reminder, that you need to execute code as root to exploit logofail and install a new bootloader. It's almost like saying if you exploit dirtycow to gain root on systems still vulnerable, then you can run arbitrary code as root on the system. It's a good demo of existing techniques, but no new revolutionary technique was used, just a clever combination.
@kazii_the_avaliАй бұрын
this being said as linux becomes more popular more idiots are gonna start sudoing at every little thing. it is deffently good to know. and mother board manufacturers are not always super clear. ive seen a few asus bios updates that say "we fixed logofail" but some that doesnt say anything about logofail at all (including mine ROG STRIX B450-F GAMING.)
@diego5733Ай бұрын
Exactly my thoughts.
@CryptoSymposiumАй бұрын
My brain can identify bot comments and it won’t even let me look at them it’s just auto skips them
@polandman07Ай бұрын
Good skill to have nowadays
@VolkTikhonАй бұрын
@@polandman07 Dystopian as fu
@FuckFistingAss7osuFF7osuАй бұрын
ai generated cat laptop.jpeg
@ThePlayerOfGamesАй бұрын
Ewww
@systemofapwneАй бұрын
Thanks for this excellent video. That's why I have SecureBoot with my own PlatformKey enrolled and latest firmware installed to mitigate logofail. Yet, it absolutely does not invalidates the point that UEFI opens an unnecessary attack vector.
@unconnectedbednaАй бұрын
I didn't deep dive in this, but isn't the point of this malware to overwrite keys? Protection for this is to implement the LogoFAIL security patch for your mobo, that was most likely issued at the start of 2024.
@TruthDoesNotExistАй бұрын
oh god the comment section is already filled with bots
@turanamoАй бұрын
yeah, lots of temple os bots and ai is bad muppets
@filthyfrankblack4067Ай бұрын
(points guun) "Always has been."
@collectorguy3919Ай бұрын
Updating your firmware via fwupdmgr often doesn't have the latest from the manufacturer. LVFS works best when manufacturers use it, but when they don't it can give a false sense of security. I've had to boot Windows just to update the firmware for both Lenovo and HP.
@unconnectedbednaАй бұрын
I bumped into that problem (on HP G1 IIRC). You needed a win install to create the update usb or some dumb stuff like that on an old HP. I solved it by installing a virtual linux machine and run the HP-bios "create usb stick .exe" there, and it worked. (I tried doing it with wine, but with no success) But I DO remember faceslapping that they only released for windows this way. But FYI, you only need a virtual machine to create the update media, not a bare metal install. Can be done from another machine, the vm does NOT have be ran on the machine you want to update bios on. On newer HP machines, you can update the bios via internet directly in BIOS by just connecting a physical lan cable with access to the internet.
@ssokolowАй бұрын
@@unconnectedbedna *nod* The fact that ASRock offers a "BIOS ROM in a Zip file" download is one of the contributing factors to my decision to build my latest Linux box around one of their boards about a year ago.
@user-fl4ug1nc1uАй бұрын
can't believe youtube shadow banned this video for 1 minute...
@SockTatersАй бұрын
How do you determine if a video is shadow banned?
@Foxyy01Ай бұрын
@@SockTatersits a joke
@PieyIsAPieАй бұрын
@@SockTaters r/woooosh
@kjullthedemonАй бұрын
@@Foxyy01 I don't get it either.
@BusinessWolf1Ай бұрын
It was not, look into how yt comment processing looks for the first few mins after upload
@snap_oversteerАй бұрын
coreboot chads keep winning
@darukutsuАй бұрын
wish more laptops came with it ootb
@vicstoronАй бұрын
@@darukutsu same, we need more stuff like system76
@marsovacАй бұрын
Then you would have more people targeting coreboot, and CVEs filed for that. What is the most used is the most targeted.
@RetroDeleteАй бұрын
Yeah, wish more laptops had coreboot support. Only device I have that supports coreboot is my ThinkPad T530, which I installed coreboot with tianocore on, quite nice to use!
@thatoneannoyingtornadosire8755Ай бұрын
@@RetroDeleteThinkPad bros just keep winning
@illogicmathАй бұрын
To be or not to be a bot. This is the question
@BsktImpАй бұрын
Predicted ages ago that, with the likely exodus from Microsoft Windows to Linux as Win10 support nears EoL, hackers and malware makers will exploit the vulnerabilities in Linux on a scale never seen.
@kayatichopperАй бұрын
took a very big poo earlier, not feeling good.
@stefanjones8042Ай бұрын
You need a bigger one
@TornadoSwoopАй бұрын
i cant blee
@kayatichopperАй бұрын
@@stefanjones8042 i'm getting there..
@dry-bonesАй бұрын
Working on one right now
@Foxyy01Ай бұрын
Keep us updated
@RecoveringFpsJunkieАй бұрын
Logofail has been patched already. This would only affect any system that hasn't done the security update.
@tanall5959Ай бұрын
The problem is that patching Logofail requires a UEFI firmware flash. Which, even if you do everything exactly correctly, still has a decent chance of bricking your motherboard. Attempting to flash my old system to fix this is what lead me to my most recent system build :P
@Pro_TriforcerАй бұрын
How often do you update your bios? Most people don't. Most people don't even know what that is. It's usually not even recommended to update bios, despite the possibility of security patches.
@justminibanana9128Ай бұрын
The last bios update made for my system was 2018 mann.
@kunka592Ай бұрын
Assuming a lot of systems with this vulnerability will ever get another UEFI update.
@HIDLad001Ай бұрын
@@Pro_Triforcer Windows automatically includes BIOS updates with Windows Update, so probably more often than you think.
@dreamhollowАй бұрын
Dude there are so many bots in the comments.
@snowflakemelter7171Ай бұрын
Dead Internet theory becomes more believable every day.
@nuclearicebreakerАй бұрын
I dunno some dude was telling us about the dump he took I dont think there's a bot that does that
@sayorancodeАй бұрын
@@nuclearicebreaker i could swear, these bots are getting more advanced by the day!
@interstellarsurferАй бұрын
So says the guy with the Ukraine-ish avatar. 👏😉
@cieplydran1Ай бұрын
@@interstellarsurferSo if someone has yellow and blue in their pfp they are a bot?
@giridharpavan1592Ай бұрын
this is how skynut is formed
@witness1013Ай бұрын
has already been released as BootyKitty
@Linkman8912Ай бұрын
I'm really curious as to what the image at 1:00 is supposed to be, it appears to be a cat with its paws on a laptop, but the laptop has a macropad instead of a trackpad?
@ciberkid22Ай бұрын
All I know is that its most likely AI Generated
@OhhCrapGuy16 күн бұрын
It's AI generated trash used by someone who doesn't understand they shouldn't be using that crap.
@Linkman891216 күн бұрын
@@OhhCrapGuy I know it's ai generated, I'm curious what sort of prompt you would have to use to get that nightmarish of an image
@samuelmatheson9655Ай бұрын
Absolutly horrifying (5 years ago)
@jonas314anoАй бұрын
4:29 say that again
@max373-1.0Ай бұрын
GET OUT OF MY HEAD
@pecopeco2815Ай бұрын
LINUX TUAH
@Ciapulek0165Ай бұрын
@@pecopeco2815Tux Tuah, sudo on that thang
@kodirovsshikАй бұрын
what
@noranoxicaАй бұрын
00:30 when a kitty cats
@RafidW9Ай бұрын
This is why you run TempleOS
@unconnectedbednaАй бұрын
Wtih pissandshittium (google that and look for the ghub) as web browser right?
@brawldude2656Ай бұрын
God protect us✊🙏🙏
@DarkF00LАй бұрын
This is why tools such as a Librem Key are important. If your system changes it changes the code. If your boot code doesn't match with the Librem Key code, it will notify you that something changed within the UEFI/TPM/Bitlocker, etc. If you made the change, update the code. If not, factory reset everything.
@madrox1989Ай бұрын
Awesome overview, and kudos for prompting folks to patch!
@KomiyanVTАй бұрын
What about disabling the splash screen, opting for the POST text instead? If I remember correctly, this was a way to mitigate the image vulnerability by not loading one at all...
@toorhideor8866Ай бұрын
been a dev for 10 years and kept my head in the computer for 20 years and i've never done one single bios update :)) always been scared of bricking the computer
@unconnectedbednaАй бұрын
If I were you I would keep that to myself unless I want to ridicule myself as a "dev". Being an insecure entrypoint to any project you work on is probably something you want to keep your mouth shut about. You are quite literally a risk to work with.
@F.M671Ай бұрын
@@unconnectedbedna You're acting as if the majority of IT workers practice common sense cysec. They don't
@josemcgomesАй бұрын
@@unconnectedbedna Any company worth their salt has MDM software that prevents this. Plus, keeping quiet is the worst possible thing you can do. We all make mistakes, the sooner we admit them, the sooner we can fix them. I'd rather hear the security team at my workplace say they missed something in their testing procedure than have a dev come up to them with that same problem because they decided to keep quiet.
@starsiegeplayerАй бұрын
The LogoFail vulnerability is a year old now. Haven't motherboard manufacturers released updated BIOS to fix it?
@XaitoАй бұрын
The real shocker was that they have a "best of the best" competition, still valuing excellence. Over here it feels like everybody gets a participation trophy.
@reversetransistor4129Ай бұрын
Nice, same idea as tracking pics, but deeper in the system, nice work!
@mikescholz6429Ай бұрын
That penguin pops back up like, I hope no one saw that lmao
@SG_GLOBALАй бұрын
Still safer than Windows... Good Info, thanks for reporting this.
@iamwitchergeraltofrivia9670Ай бұрын
No
@SG_GLOBALАй бұрын
@iamwitchergeraltofrivia9670 Are you on of those Linux ully-Trolls or is there an intelligeable response to be made on your behalf?
@salce_with_onionАй бұрын
@@SG_GLOBALLinux safer than Windows is like laughable statement. By that logic TempleOS is the most secure system. The most vulnerable link is always the user, and the more obscure and unknown OS the less chance user would be dumb in his actions.
@SG_GLOBALАй бұрын
@@salce_with_onion Valid. OPSEC is the largest issue under todays survellience state.
@ahmetrefikeryilmaz4432Ай бұрын
The footage of penguins throwing themselves from the cliff was masterfully put.
@M-dv1yjАй бұрын
My work is called unified emergent field theory. And I miss read you using that acronym 😂. I was like who made a booklet in my work. 😮💨
@stage6fan475Ай бұрын
algorithm. Thanks for doing all the work to find, understand, and explain these events. Greatly appreciated!
@DerekSmitАй бұрын
I once heard 1 out of 3 comments is by a bot, but this comment section is more like 9/3 comments is by a bot!
@marklundeberg7006Ай бұрын
BMP files are actually often compressed. Run length encoding, the lowest form of compression (bad but helps a lot for a small logo on a black background).
@JimBob1937Ай бұрын
Yeah, he likely meant that BMP are lossless, rather than lossy. People usually refer to lossless as uncompressed, even if reversible binary compression techniques are used.
@JamaicaWhiteManАй бұрын
All I know is that everything I do on my Linux desktop takes half the time it did when I last used Windows, with no constant crashes of QGIS. As far as the bootkit goes, I'm sure it will be taken care of before I upgrade to the next version of Mint (22.1).
@unconnectedbednaАй бұрын
1. No software in userspace on EARTH can protect you from this. (there is absolutely nothing mint or any distro can do about this) 2. It already IS patched, in Januari of 2024. LogoFAIL firmware patch for your MOTHERBOARD.
@MaritosuАй бұрын
From the 💻Linux to the 🎋virus to the 🛤️UEFI to the 😺bootkitty🗣️🔥🔥🔥 wheres my 🏥Programmer always when my bios is broooookeeen💀
@X-i_i-KАй бұрын
1:01 the cat on the laptop is AI
@brunodangelo1146Ай бұрын
You are clearly an AI bot
@Web720Ай бұрын
No shit.
@danielbaker1248Ай бұрын
You should do videos on how to patch these vulnerabilities as they come out.
@Julio860JVLАй бұрын
Attempt # 4. Trying to get your attention to check your microphone because your S letters sound like a sword cutting something.
@VilematrixАй бұрын
Thanks for the explaination. I Can Now know for sure that I got 2 bootkits on 2 laptops of mine 😂
@WorBluxАй бұрын
firware updates applied, thanks for the reminder!
@FriggnH8tersАй бұрын
wtf are these comments
@ArbyFyrelyteАй бұрын
Joke is on ya'll, I disable fullscreen logo because I think the debug and boot information looks better
@unconnectedbednaАй бұрын
Joke's on me, I GET NO extra information by disabling it, just a black screen instead. xD Still disabled it when patching this security flaw in januari of this year though...
@ArbyFyrelyteАй бұрын
@@unconnectedbedna I mean yes I do too. But, I always did. I don't like other people's logos on the machine that I put together.
@UsernameDoesntCareАй бұрын
Gonna go make my own bootloader to btfo all malware by security by obscurity.
@kneel1Ай бұрын
haha I was so mad when Gigabyte removed the ability to replace the Aorus logo, but they said it was a sec vuln
@EdnovStormbrewer25 күн бұрын
This method isn't old news. This bmp method was also used on older Sony PSP models as a viable way to jailbreak it.
@ArthurTheEpicGuyАй бұрын
The more popular the OS means more attacks on said OS.
@MaskMajorАй бұрын
Awww but it has such a cute name tho!!!
@LouisSerieusementАй бұрын
The best of the best is also a very fun and cheesy 80's karate movie x)
@iosefka4567Ай бұрын
Hey Outlaw, does secure boot protect linux and do you recommend it? I ask because most distros don't support secure boot.
@bcredeur97Ай бұрын
What if your old computer doesn’t get the update?
@bananaman9869Ай бұрын
Logofail and now this, should’ve just listened to Luke Smith and use BIOS.
@robotron1236Ай бұрын
I’m almost positive that he is luke smith. 😂
@THEGOOD360Ай бұрын
I feel like we are on the verge of an internet dark age...
@Z3r0Sk83rАй бұрын
Master Boot Record mentioned.
@ah-64apache84Ай бұрын
how would you go about recovering a compromised system???
@D.von.NАй бұрын
That interests me too... at worst send it to some specialist to flash the entire UEFI. I think Chernobyl did a similar thing. My mate had it back then. Nasty stuff.
@kunka592Ай бұрын
Probably just a BIOS/UEFI flash.
Ай бұрын
It's been more than 10 years since I've seen something similar. But this still requires phisical access.
@myhandleiswhatАй бұрын
I half expect bootkitty to become a popular VTuber channel name and it'll completely drown out this entire discussion about this.
@IlluminatiBGАй бұрын
Sounds amazing. But how do you switch logo with the infected image without root access?
@TILRАй бұрын
so what happens if say the bios hasn't been updated from the motherboard manufacture since oh idk 2018
@comradepeter87Ай бұрын
Don't most people keep secure boot off anyways in order to dual boot?
@codemiesterbeatsАй бұрын
My grandma had a black cat named Boo and she often called it Boo Kitty.
@guppy13Ай бұрын
how do you screw up something as trivial as a bmp decoder
@xDMG15xАй бұрын
How does the attacker get the bmp onto the flash chip or wherever the original boot logo lives?
@misterholmes2758Ай бұрын
Could you make a video on your thoughts about SteamOS?
@simonbackwashАй бұрын
🐧Th penguin fall footage was rough ! 🐧🤕.
@chrisn1847Ай бұрын
I have been working through Jon Ericsson’s book. The NOP sled seems to constantly fail due to stack canaries. You mentioned memory randomization not working, but are stack canaries not enabled when working at the point of bootup?
@justinriley-l8oАй бұрын
What do you think of Libreboot in 2024?
@BenParkes-wz5bdАй бұрын
As a person who uses inside h20 BIOS, this scared me a little bit cus my manufacturer doesn't provide new BIOS updates anymore
@FebruaryWashingtonАй бұрын
lmao same. really makes you feel like you're still using Windows XP after all this time!
@dnman192Ай бұрын
7:40 And yet that's impossible to do w/o installing Windows first on my Lenovo laptop, genius.
@alien76Ай бұрын
if all the small businesses would understand the scope of such vulnerabilities..
@gabrielnilo6101Ай бұрын
so they discovered NSA toy and now it's going to be fixed in the future?
@anonymoususer13666Ай бұрын
This is legitimately terrifying
@HikaruAkitsukiАй бұрын
So we have to be more careful on third party or unknown distro that does not supported by the community?
@FranekMuschilekАй бұрын
you could probably easily see if your system is infected by after setting up your OS directly making a clone of your MBR partition to an external drive and once in a while check bit for bit via a life linux if this is still the same as your MBR on the disk.
@lavaosАй бұрын
at least using this, we are able to understand how this could occur in the wild, and possibly the vulnerability can be patched up, right?
@unconnectedbednaАй бұрын
It was, in Januari 2024. LogoFAIL security patch for your mobo.
@Foche_T._SchittАй бұрын
Jokes on them, I never figured out how to install an OS using UEFI.
@いか-z4z1oАй бұрын
how do you do fellow bots
@zxGHOSTrАй бұрын
You know how they say "enough internet for today"? Maybe we should skip internet for ever.
@MerabbitАй бұрын
Would the affect a type 1 hyper visor? Probably just the OS running on the bare metal?
@alanonsr3942Ай бұрын
then all we got to do then is update the bios?
@anti_globalistaАй бұрын
What would the path of infection be, how do they install it (if someone decides to use it non-ethically)?
@LocalHost-p4x17 күн бұрын
Im curious does it effect core boot do we have any info on that
@random80085Ай бұрын
What if you disable the show boot logo in the uefi settings??
@brentsanerАй бұрын
UEFI doesn't *have* a Master Boot Record. It has an (or more than one) EFI System Partition.
@Super61aАй бұрын
so what do i do if im using 20 year old technology?
@FlameForgedSoulАй бұрын
Pray? Buy new gear? One of those.
@Super61aАй бұрын
@@FlameForgedSoul ibm is love, ibm is life.
@interstellarsurferАй бұрын
@@Super61aBest space heaters ever made. 👍
@Compact-Disc_700mbАй бұрын
@@FlameForgedSoul New stuff already has built in malware, intel me and amd psp. cell phones also have embedded malware.
@Vidjnjsdnjk-en6tzАй бұрын
@@Compact-Disc_700mb Why don't the feds use them then?
@theloststarbounderАй бұрын
if(image.width > 0 && image.height > 0) fixes it
@hampocampo26 күн бұрын
Does flashing the BIOS remove it?
@MGunners9Ай бұрын
I am new to Linux, Fedora 41. How would I go about those updates you suggested? Many thanks