“A pair of Argentinian researchers have found a way to perform unveil a BIOS level malware attack capable of surviving even a hard-disk wipe. Alfredo Ortega and Anibal Sacco from Core Security Technologies — used the stage at last week’s CanSecWest conference to demonstrate methods (PDF) for infecting the BIOS with persistent code that will survive reboots and re-flashing attempts. The technique includes patching the BIOS with a small bit of code that gave them complete control of the machine. The demo ran smoothly on a Windows machine, a PC running OpenBSD and another running VMware Player.”Here is some more Tech News from around the web:
- .50 BMG Vs. 18 Hard Drives @ [H]ard|OCP
- Xeno: Bigfoot’s Second-Generation Killer NIC @ OCModShop
- Hard Drive Destruction – 4 Guns and a Hard Drive @ TechwareLabs
- The Future of Television and HDTV @ Digital Trends
- Pittco Iron Storm X LAN Party @ ThinkComputers
- PromoLocker – Promotion Through Technology @ ExtremeMhz
- Logitech QuickCam Communicate Deluxe @ Phoronix
- PromoLocker Customized USB Flash Drives @ Bjorn3D
- TrendNet TV-IP422 @ SweMOD
- Internet Explorer 8: One Step Forward, Three Steps Back @ Digital Trends
- The TR Podcast 38: Hello Mr. Hawking, Dell does sexy, and affordable Core i7
- HEXUS.winners win4FREE competitions: win 1 give 1 notebooks with Acer at Misco.co.uk
The gift that keeps on giving

It looks like you may want to be really careful who gets to touch your PC as they could give it something that will never be cured, even if it goes into remission. According to the article on Slashdot, the only prevention is to ensure that no one has exclusive unprotected interaction with your PC, otherwise you might find a little something in your BIOS that keeps coming back. Since the actual infection resides in the BIOS, a compromised machine has no defence, and the ability to survive flashing makes this rather worrisome, especially if someone can manage to put it in a root kit.