marianomarini_vi wrote:To modify BIOS firmware (now almost all build in flash technology) viruses has to access directly the hardware or use the embedded software. Both operations rely on OS (at least for the installation).
Actually, that's not true. A hypervisor can install anything it wants regardless of the OS running on top of it. The trick is getting the code implanted on the host machine, whether through a virus, a computer hack, or a bogus driver. Once I have code implanted, I just have to tell the computer to boot that code first. The next time the system reboots, it runs the code I implanted and can do whatever it wants to the underlying hardware before the OS even boots. Once it makes that implant, it removes itself and boots the standard OS. Once that happens, you have a very small chance of ever detecting it.
For instance, check out this link:
BIOS hack. As the article states, this worked for Windows, OpenBSD, and through VMware. This method take a slightly different angle, but still effective and still possible on Linux OS's as well as Windows. You'll probably also want to check the link on that site about persistent rootkits. As the article says, "Getting root on a Unix box or taking full control of a Windows machine is just a matter of having the patience to find a soft spot in the operating system or one of the applications and then moving up the stack from there."
I'll go ahead and let the issue drop now, but I just want people to be aware of this kind of stuff. Like I said originally, agree with it, don't agree with it. But working full-time in vulnerability analysis, I just want to pass on what I've learned.