Do not attempt to remove the virus or shut down your computer.
Because this may constitute a data security incident, contact your IT Administrator or the IT Help Center immediately.
We'll start, however, by giving you some quick and basic advice on prevention.
(This is particularly important in light of recent news stories.
Their exploit turns down existing protections in place to prevent re-flashing of the firmware, enabling the implant to be inserted and executed.
The devious part of their exploit is that they've found a way to insert their agent into System Management Mode, which is used by firmware and runs separately from the operating system, managing various hardware controls.
A simple operating system replacement may leave the virus to continue its evil ways.
By Marco Giuliani In the past few weeks a Chinese security company called Qihoo 360 blogged about a new BIOS rootkit hitting Chinese computers.
This turned to be a very interesting discovery as it appears to be the first real malware targeting system BIOS since a well-known proof of concept called Ice Lord in 2007.
The malware is called Mebromi and contains a bit of everything: a BIOS rootkit specifically targeting Award BIOS, a MBR rootkit, a kernel mode rootkit, a PE file infector and a Trojan downloader.
[...] Although most BIOS have protections to prevent unauthorized modifications, the researchers were able to bypass these to reflash the BIOS and implant their malicious code.
[...] Because many BIOS share some of the same code, they were able to uncover vulnerabilities in 80 percent of the PCs they examined, including ones from Dell, Lenovo and HP.