By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Forget books, time to burn the dolls
    1 year ago
    Xiaomi Mi Robot vacuum cleaner hacked
    1 year ago
    What happened to the Internet: attack on Cisco switches
    1 year ago
    Latest News
    Patchstack Alliance Bounty Program Events for December
    1 day ago
    Your Smart Coffee Maker is Brewing Up Trouble
    1 day ago
    Earn up to $10,000 for Vulnerabilities in WordPress Software
    2 days ago
    Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Surface Pro 4 teardown: Get a closer look at the components
    1 year ago
    How to reset Windows Update components on Windows 10
    1 year ago
    Windows 11 build 22610 with new changes in Dev and Beta Channels
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    How to stop, disable, and remove any Android apps β€” even system ones
    16 hours ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    2 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    3 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    4 days ago
    Windows brings nostalgia to the holidays with the return of Windows Ugly Sweaters, this year featuring the Bliss backdrop
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Hide your IP address from trackers in Safari
    1 year ago
    Simultaneous display of all search results in Firefox
    1 year ago
    Easter eggs about Google in DuckDuckGo
    1 year ago
    Latest News
    Change screen brightness on Windows 11
    2 days ago
    How to share Microsoft 365 Family subscription with other people
    4 days ago
    How to enable random MAC address for Wi-Fi on Windows 10
    4 days ago
    How to join Office apps to Microsoft 365 Insider Program
    4 days ago
  • Glossary
  • My Bookmarks
Reading: Virus can inflict physical harm onto a PC: myth or truth?
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

Virus can inflict physical harm onto a PC: myth or truth?

Vitus White
Last updated: 13 October
Vitus White 1 year ago
Share
6 Min Read

In fact, it’s the one of the most widely believed myths in the infosec world. At the same time, it’s the most non-standard one. That double-sided nature is likely the reason why the myth is so enduring.

At the dawn of the PC era, the late 20th century, users frequently spread scary stories that happened “to one of good friends of theirs,” from a virus. In such stories, viruses, for instance, fed some ‘wrong’ interlacing to a CRT monitor and ‘burned out’ the PC’s hardware components. In other tales, malware made HDD plates ‘resonate’ fiercely, ultimately destroying hard drives. Or overclocked a floppy drive to cause an imminently deadly rotor overheat.

Antivirus developers have constantly busted those myths. Sure some of these cases are theoretically plausible, but built-in foolproof protection mechanisms don’t allow such failures to happen. So, as they say, sleep tight, little friends, they shall not pass, and all that kind of stuff.

Fact or Fiction: can a #virus actually damage PC hardware? #infosec

Tweet

Users pretend to be satisfied with these explanations, yet continued to believe in myths. Anything can happen, after all, with vendors hushing up things.

Yet, life is a curious thing and full of surprises. For example, back in 1999 a massive Win95.CIH (a.k.a. Chernobyl) virus pandemic took over thousands of machines. That malware corrupted data stored both on a hard drive and on BIOS chips on motherboards. Some of the affected PCs would not start as their boot program was damaged. To level the adverse effects of the attack, one had to replace BIOS chips and rewrite the data.

Was that effectively a physical damage inflicted on a PC? In reality, no. After a series of manipulations motherboards could be cured and returned to the operating state. But the problem could not be solved by standard ‘home emergency kit’ and required specialized equipment.

Today, everything is even more confusing.

First, any standalone piece of hardware is bundled with a rewritable microprogram, at times with even more than one. I’m surprised this trend did not affect screws which hold this too smart hardware together.

Indestructible malware by #Equation cyberspies exists, but don’t panic yet: https://t.co/a3rv49Cdnl #EquationAPT pic.twitter.com/Gaf0HCjHoY

— Kaspersky Lab (@kaspersky) February 17, 2015

Each of those microprograms has been evolving for years, having become quite a complex piece of software, which is by design potentially open to an attack. Once the attack is successful, the consequences are not always immediately remediable.

Take the story about modified firmware of hard drives. For the record, while analyzing the Equation cyberespionage campaign, Kaspersky Lab experts explored spyware modules injected into microprogram code for a number of different HDD models. These pieces of malware are used to gain complete control over the affected disk; which cannot be remedied even by formatting.

The only way to remove nls_933w.dll #TheSAS2015 #EquationAPT pic.twitter.com/zfVE1kKyha

— Fabio Assolini (@assolini) February 16, 2015

One cannot change the firmware by means of a standard toolset — the firmware is responsible for updating itself. As you would expect, it puts a hell of a fight when someone tries to lure it from where it belongs. Of course, if you happen to be in possession of specialized equipment, you might be able to apply force and change any microprogram. In real life, an affected drive goes straight to the trash – it’s the most cost-effective option.

Can it be considered physical damage? Well, that’s disputable. But the number of stories about hardware-based vulnerabilities continues to increase.

5 threats that could affect hardware – http://t.co/CP1DSfkgy3 pic.twitter.com/cnse35hAr3

— Kaspersky Lab (@kaspersky) April 27, 2015

Second, it’s quite unclear what kind of machine can be defined as ‘computer.’ For instance, any current car is, to some extent, a computer — and what’ even more important – a connected computer on wheels. It is exposed to remote hacks and compromise, as we found out in a recent well-publicized demonstration of the remote hack of a Jeep Cherokee.

#BlackHat 2015: The full story of how that Jeep was hacked https://t.co/y0d6k8UE4n #bhUSA pic.twitter.com/SWulPz4Et7

— Kaspersky Lab (@kaspersky) August 7, 2015

Right, the hack was performed by hackers, not a virus — Ok, it was a piece of cake, given years of research this hack took. However, it won’t come as a surprise if an attack like that will end up with a car hitting some pole on the roadside. I guess this can be called damage.

So, can a virus actually damage PC hardware? Is it fact or fiction?

That’s truth. However, the answer here heavily depends on what you actually mean by “damage”, “virus”, “PC”, etc.


Source: kaspersky.com

Translate this article

TAGGED: Apple, Malware, Software, SQL injection, Threat, Threats, Vulnerabilities, YouTube
Vitus White October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

How to stop, disable, and remove any Android apps β€” even system ones
How To 16 hours ago
Patchstack Alliance Bounty Program Events for December
Patchstack Alliance Bounty Program Events for December
Wordpress Threats 1 day ago
Your Smart Coffee Maker is Brewing Up Trouble
Threats 2 days ago
Bigger, Better, Cooler in a 2U1N form factor
Bigger, Better, Cooler in a 2U1N form factor
Apps 2 days ago
Change screen brightness on Windows 11
News 2 days ago

You Might Also Like

Patchstack Alliance Bounty Program Events for December
Wordpress Threats

Patchstack Alliance Bounty Program Events for December

1 day ago
Threats

Your Smart Coffee Maker is Brewing Up Trouble

2 days ago
Earn up to $10,000 for Vulnerabilities in WordPress Software
Wordpress Threats

Earn up to $10,000 for Vulnerabilities in WordPress Software

2 days ago
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Wordpress Threats

Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Earn up to $10,000 for Vulnerabilities in WordPress Software
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Short-URL Services May Hide Threats
Vulnerability in crypto wallets created online in the early 2010s
Wordfence Intelligence Weekly WordPress Vulnerability Report (November 20, 2023 to November 26, 2023)
Thrive Theme: Dismiss Tooltip to Privilege Escalation
Previous Next
Hot News
How to stop, disable, and remove any Android apps β€” even system ones
Patchstack Alliance Bounty Program Events for December
Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Change screen brightness on Windows 11
10alert.com10alert.com
Follow US
Β© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?