jhansonxi :
And you're going to do that with a BIOS flash utility, running on an infected OS, connecting to an infected BIOS, and you think the malware writers didn't plan for that? The only program that has more control over your system than the BIOS is the CPU microcode (which the BIOS can also patch to fix CPU bugs). I think it's also possible to infect the BIOS boot recovery block so unless you have a system with a dual BIOS (like some server MBs), then you're not going to get rid of it. It's also possible to infect the system through the CMOS.
In the old days the solution was to pull the BIOS ROM, reprogram it on a PROM burner with a clean BIOS copy, clear the CMOS, then reinstall the ROM. Not so easy to do on today's systems.
I knew someone is gonna say that!
1) The quote I listed in my original post said
even if an antivirus detects and cleans the MBR infection, it will be restored at the next system startup
I was referring to that (HDD format after cleaned BIOS = rootkit pwnd)
2) You can also flash the BIOS on boot
3) Try GETTING that rootkit... it's not like it's running around the internets and storms every computer it sees... I actually WANT to find and isolate it, then test (use old Celeron 500 MHz rig with XP for that) - add it to my virus zoo after that, if it's functional
4) It's possible to infect the system through the CMOS, maybe. It's also possible to break your PC with a hammer, short the motherboard or throw it out of the window, but the article doesn't say that this particular rootkit does any of these things apart from infecting winlogon.exe, wininit.exe and BIOS. And CMOS can always be reset.
This speculation can go on, but you catch my drift... nothing is as scary and dangerous as they describe it. Just know what you're doing, don't panic, and you'll always triumph over any BS malware.