It’s a little late, but humor me. I have one hell of a scary story.
Your computer is infected with a virus. But there’s no way to prove it’s infected. You just notice little things. It won’t boot off a CD anymore. Certain web sites won’t load on your computer. Yet those same web sites, those same CDs, work on other computers just fine.
But soon the rest of your computers start to experience these same symptoms. You isolate them. Pull them off the internet. Physically remove the wired and wireless network cards. Then you run some diagnostics and see, somehow, it’s still talking over some phantom network that it can’t possibly connect to. What else is there? The speakers? The microphone? And when you physically remove them … that network activity stops?!
You figure out how they’re getting infected. It’s the USB sticks you use to transfer files. Stop using the USB sticks. Flash the BIOS. Reformat the hard drives. Reinstall the OS. All OK, right? WRONG! It’s still there.
And here’s the kicker: one is a Linux box. The other is a Mac OS box. Another is a Windows box. Different operating systems. All infected. HOW?!
This horror tale is one told by a security expert. One who has the credentials and the reputation to believe he’s not making this up. This is the story of BadBIOS.
Is this all really possible? And why waste what would be the most sophisticated virus ever seen on a single individual and not sell it, or use it on extremely high-value targets like banks or governments?
Continued on the inside…