Mozna jde, mozna nejde. Otazka je, jak moc velky kus SW se da do firmwaru nacpat. Ale to mozna neni dulezite, protoze kus muze byt na disku ve skrytych sektorech, ktere si ten kousek ve firmware ohlida. Takze by to take mohla byt nejaka virtualizace, ve ktere je pak bezi samotny OS, ktery se tak tezko o necem dozvi.
Nebo to muze byt rootkit ve stylu Sony nebo lepsi, ktery se pred detekci skryva. V bezicim OS ho pak nedetekujete a pokudd zabootujete z externiho media, tak na disku neni nic, co by vzbudilo podezreni a do firmware antivirak nema pritup.
Krome toho hraje roli i to, ze veci jako I Love You se behem kratke doby rozsiri na miliony pocitacu a tak neujdou pozornosti a do par dnu jsou v definicich antiviraku. Ovsem obskurni infekce, ktera v danem okamziku bezi napriklad na 5000 pocitacu v celem svete, na sebe prilis neupozornuje. Nemailuje, data nemaze, nezobrazuje legracni hlasky, vse se chova uplne normalne a antivirak take nic nerika. Koho by napadlo, ze mu data potichu vytekaji pod rukama ven? To byste musel sledovat kazde spojeni ven z vaseho stroje a dumat, proc prave tam a jestli pocet paketu dava smysl.
Navic treba proti tomuhle se bojuje dost blbe:
"The Fanny worm stands out from all the attacks performed by the Equation group. Its main purpose was to map air-gapped networks, in other words – to understand the topology of a network that cannot be reached, and to execute commands to those isolated systems. For this, it used a unique USB-based command and control mechanism which allowed the attackers to pass data back and forth from air-gapped networks.
In particular, an infected USB stick with a hidden storage area was used to collect basic system information from a computer not connected to the Internet and to send it to the C&C when the USB stick was plugged into a computer infected by Fanny and having an Internet connection. If the attackers wanted to run commands on the air-gapped networks, they could save these commands in the hidden area of the USB stick. When the stick was plugged into the air-gapped computer, Fanny recognized the commands and executed them."