Hi, I recently assembled my own PC using a supposedly brand new motherboard but one that doesn't come sealed in any way when delivered. So I got worried and came across Eset as one of the few AVs that can scan UEFI or BIOS for viruses/malware. But I'm having some trouble using the scan. It seems to be unable to scan the BIOS/UEFI files as it can't open the necessary files for scanning. I read some other posts in this forum regarding the "unable to open" log messages but the answers given were not clear to me as a non techie person.
-according to the following link Eset will be able to scan those unopenable files during startup and shut down but I can't find the logs of those scans happening during startup or shutdown. Why? (link: -error-notifications-in-computer-scan-log)
Even if you scan files or other objects as an administrator, not all of them can be accessed, e.g. because the OS is exclusively using them. If they are locked for an antivirus, they are locked also for malware.
Thank you for posting. But the answer you have given is similar to other threads but the meaning or implication of the answer is not clear to me that's why I started this new post. When you said "If they are locked for an antivirus, they are locked also for malware" can I then safely conclude based on that statement and my log above that my BIOS/UEFI is clean?
Here's an example of a UEFI bootkit: -especter-uefi-bootkit-discovered. Here's Eset's detailed analysis of the bootkit: -threats-moving-esp-introducing-especter-bootkit/ . At the end of the article are IOC's for the bootkit along with Eset's detection's of its various component's.
I did update the BIOS firmware but since I got no CD-Rom drive or USB with write-protection I loaded a USB with most updated BIOS file and set it to read-only. I also checked the SHA256 hash code of the BIOS file on the USB before and after I updated the BIOS to make sure the BIOS file remained unchanged. But stupidly the SSD was connected to the motherboard during bios update though the SSD was brand new. Do you think that could wipe any BIOS viruses? I had to improvise lol
The first sentence quoted above is the exact sweet answer I was looking for. But just to clarify on the second sentence, the offline scan is referring to the scan I did right? (you're trying to differentiate what I did from ESET's online scan offering?)
Also if your concerned about motherboard firmware tampering from an external source prior to your receipt of the product, you should re-flash the BIOS with the latest update available from the motherboard manufacturer web site as previously posted. This BTW is S.O.P. when installing a new motherboard.
Here's an Eset article on a UEFI based bookit it discovered a while back: -threats-moving-esp-introducing-especter-bootkit/ . Obviously, Eset can and does scan the Win system recovery partition where the UEFI is located.
Next is the fact that UEFI based malware is extremely rare in occurrence. When it does occur, the targeted device has been previously compromised to bypass Win Secure Boot processing which is the primary protection against UEFI based malware.
I have been wanting to switch to Linux for many years, and I finally took the step to download a Fedora 30 KDE live CD iso (actually USB) and give a try installing it. Since this is the computer I use for work, I want to keep a dual-boot system with Windows 7, at least during a transition period. The installation has not been successful though, and after spending all day today trying to figure out what might be the problem I found this video: Install Fedora 23 in Legacy Mode (Dual Boot Windows 7/8/10) - YouTube which was very helpful.
So my USB boots in UEFI mode, but I would like to install it in legacy BIOS mode. Is there any way to do this? Can I burn the USB in a different way so that it would boot in legacy mode, or can I add a configuration switch somewhere?
is there a way to change this command to make it run the legacy mode? i tried changing linuxefi to linux and initrdefi to initrd and run Ctrl-x, and the system did start, but I get the same errors as before with anaconda still trying to install and EFI system.
In my bios at least i can choise the option 1 or 2. If i select the option 1 i am only disponible to install in UEFI mode so that when I place the usb only can see UEFI:USB install. If I choise the option 2 I will can choise into 2 options when I place the USB:
I think you do need check your configuration into the BIOS. The only thing what is strange to me about it that you did comment is what if you can run only UEFI How is windows 7 loading in mode BIOS, it is what is chocking me.
Yes, I went to my HP BIOS manual and I double checked that the settings are enabled to be able to run both. As my boot loader is a bit fucked up atm, I need to get to the BIOS boot menu to start the system anyways, and the options I can choose there are (the comments in parenthesis are mine) :
Yes!!!
Thank you so much. The USB that RUFUS burned finally was able to be loaded in legacy BIOS mode and after that it was a 10 minute smooth ride to a successfull installation. Now I have a fully functional dual boot.
If you have servers that use UEFI BIOS, the Linux BES Client (as of 9.5.4.38) is not able to query smbios/dmi info. Feel free to vote on the RFE I just created for this to get this included in a future release. Thanks
Hello, I have the following problem:
I want to remove the Veracrypt bootloader option from my UEFI boot options.
I've formatted the hard drive and even removen it from the machine at this point.
However, the following boot option persisist in the UEFI, even when no drive is present in the machine:
"VeraCrypt BootLoader (DcsBoot)"
I've tried resetting the bios, manually disabling the item, I've used the jumpers to clear out the bios but nothing helps!
If you can somehow remove the VeraCrypt entry on the EFI partition, this should solve the issue. Note: you may need to repair the Windows boot loader afterwards. Please research carefully. Hopefully someone with more knowledge on this subject will be able to help you.
The only other option is to erase the entire hard drive (the one that VeraCrypt was used on) with something like a DBAN boot disk (rather than just reformatting, which may have only erased the NTFS partition and not the EFI one).
After erasing the entire hard drive, resetting the TPM (if present) and clearing the BIOS (as per my earlier post), re-install Windows in UEFI mode again - disable CSM in the BIOS before installing Windows (then save and exit the BIOS).
Do the following in Windows...
Download the latest BIOS version (non-beta) from the computer manufacturer for the brand and model number of your computer; if the computer was self built, download from the motherboard maker's website for that brand and model of motherboard.
The files are usually zipped up; extract all the files into a folder.
Right-click on the executable file, then left-click Run as Administrator. Follow the on-screen instructions. DO NOT power off or interrupt the BIOS update, as you could brick the motherboard!
same problem with this piece if crap software,,,,i was installing and when it wanted to pre-test the encyption...the password wouldnt be accepted in the bootup from bios....now i got the dam veracrap in my bios bootloader with the other OS's...sincevim beta testing its not such a big deal...but there really needs to be a script code thst is implemented after you unstill this crap software so it erases all the crap it put into my bios....now i have yo take the battery out,,,jump my cmos,,,erasure all my partition drives on a duel boot system..and hope that flushes it out....my god what a pain in the ass
UEFI is not BIOS! UEFI does not have CMOS, so, removing the battery will not change anything. Boots enties stored in small flash area in UEFI chip in motherboard. It can be easly edited with special software like EasyUEFI or BOOTICE.
Yes, this is a bug in uninstaller, but the efi module appeared in VeraCrypt just recently and the author simply does not have enough resources to solve all situations with new hardware. Paid and extremely expensive BestCrypt Volume Edition has the same bug.
The UEFI and BIOS are two firmware interfaces crucial in booting up a computer system. While they serve the same purpose, the two have significant differences. Understanding these distinctions is essential, particularly for individuals seeking a deeper understanding of computer systems.
This blog will explore the disparities between UEFI and BIOS and shed light on their individual functionalities. By comparing their features, advantages, and limitations, we aim to provide readers with a comprehensive understanding of UEFI and BIOS and enable them to make informed decisions regarding their computer systems.
Compared to the BIOS, UEFI offers several advantages. UEFI supports larger hard drives and can handle partitions greater than 2.2 terabytes, whereas BIOS has limitations in this regard. It also supports a more modern and graphical user interface, making navigating and configuring system settings easier.
BIOS is short for Basic Input/Output System. It is a fundamental firmware interface found in computers. During the boot process, it is responsible for initializing hardware components, such as the processor, memory, and storage devices. The BIOS provides the necessary instructions for the computer to start and load the operating system.
Unlike UEFI, the BIOS has been around for decades. This is one of the reasons why bios works seamlessly in older devices. The main difference between UEFI and BIOS lies in their architecture and capabilities. While BIOS uses 16-bit mode and has a limited user interface, UEFI uses 32-bit or 64-bit mode and offers a more advanced graphical user interface.
d3342ee215