Logo Fail Exploit

  • Thread starter WWGD
  • Start date
  • #1
WWGD
Science Advisor
Gold Member
6,916
10,321
How bad serious is the Logo Fail exploit, where malware is spread through images?
Is there a way of booting up in a way that images/logos are not displayed?
 
  • Wow
Likes Wrichik Basu
Computer science news on Phys.org
  • #3
Forgot to say YIKES!

This exploit is truly scary.
 
  • Like
Likes Wrichik Basu and WWGD
  • #4
  1. Calling LogoFAIL an 'exploit' is misleading (I know it's not your term @WWGD): it is a (series of) vulnerabilities.
  2. No evidence of any attempted exploit involving LogoFAIL has been published.
  3. The vulnerability was discovered by a benign research group sometime in 2023 and disclosed confidentially to vendors: when the discovery was made public on 6 December 2023, BIOS patches were published by all vendors (except Phoenix who in an appalling move jumped the gun on 28 November).
  4. In order to exploit the vulnerability an attacker requires administrator access. Once an attacker has administrator access it is 'game over' as far as security is concerned anyway.

If you follow these two rules you don't need to be afraid of any kind of technical attack on your personal Windows or Mac system*:
  • Keep your system up to date with the latest patches of supported software.
  • Never allow untrusted software to gain administrator access e.g. by saying 'yes' to the "Do you want to allow this app to make changes to your device" dialog unless you are sure that you can trust the relevant app.
* (or Linux if you can be sure of what is 'untrusted software' in this context, and unless you are running a commercial distribution this is very difficult).

jedishrfu said:
This exploit is truly scary.
Only in the sense that if you lend someone the keys to your house they can take a copy and then they can let themselves in whenever they want that is 'truly scary' - but if you lend someone the keys to your house they can do whatever they want while they are there anyway.

Much more dangerous and scary, and something you do need to be constantly cautious of because there is very little by way of automatic defence that can be put in place are social engineering attacks.

Scary headlines about technical attack surfaces distract the attention of the public from the real threat.
 
Last edited:
  • Like
Likes berkeman and WWGD
  • #5
Isn't there
pbuk said:
  1. Calling LogoFAIL an 'exploit' is misleading (I know it's not your term @WWGD): it is a (series of) vulnerabilities.
  2. No evidence of any attempted exploit involving LogoFAIL has been published.
  3. The vulnerability was discovered by a benign research group sometime in 2023 and disclosed confidentially to vendors: when the discovery was made public on 6 December 2023, BIOS patches were published by all vendors (except Phoenix who in an appalling move jumped the gun on 28 November).
  4. In order to exploit the vulnerability an attacker requires administrator access. Once an attacker has administrator access it is 'game over' as far as security is concerned anyway.

If you follow these two rules you don't need to be afraid of any kind of technical attack on your personal Windows or Mac system*:
  • Keep your system up to date with the latest patches of supported software.
  • Never allow untrusted software to gain administrator access e.g. by saying 'yes' to the "Do you want to allow this app to make changes to your device" dialog unless you are sure that you can trust the relevant app.
* (or Linux if you can be sure of what is 'untrusted software' in this context, and unless you are running a commercial distribution this is very difficult).


Only in the sense that if you lend someone the keys to your house they can take a copy and then they can let themselves in whenever they want that is 'truly scary' - but if you lend someone the keys to your house they can do whatever they want while they are there anyway.

Much more dangerous and scary, and something you do need to be constantly cautious of because there is very little by way of automatic defence that can be put in place are social engineering attacks.

Scary headlines about technical attack surfaces distract the attention of the public from the real threat.
Fair-enough; I may have jumped the gun. But Jedi's articles refer to it as a vulnerability only:
"LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years...."
 
  • #6
I'm still puzzled at how image files can transmit malware.
 
  • #7
Malicious actors can embed malware code or instructions within the pixels of an image file without visibly altering the image's appearance. This technique is called steganography. The malware may be hidden within the least significant bits of the image's pixels, making it difficult to detect without specialized tools.
 
  • Like
Likes WWGD

Similar threads

  • Computing and Technology
Replies
7
Views
1K
  • Programming and Computer Science
Replies
23
Views
4K
Replies
5
Views
1K
  • Computing and Technology
Replies
7
Views
380
  • Computing and Technology
Replies
2
Views
1K
  • DIY Projects
Replies
11
Views
1K
  • Computing and Technology
Replies
30
Views
2K
  • Programming and Computer Science
Replies
12
Views
1K
  • Computing and Technology
Replies
1
Views
739
  • Computing and Technology
Replies
9
Views
3K
Back
Top