One type of malicious code, discovered only after three years to affect a computer lab, attacks several operating systems: Windows, iOS, Linux and BSD (Berkeley Software Distribution). The dangerous virus “spread” from one computer to another using ultrasound. BadBIOS is a very dangerous malware. The expert took all this time to find out why their computers were restated alone and connected to the internet, even without any connection enabled. Finally able to determine that it is a malware that directly affects the BIOS (Basic Input / Output, for its acronym in English) of the computer, which has given the name of ‘badBIOS’, and getting equipment interfacing others through ultrasound, undetectable to the human ear, which were issued by the speakers and microphones detected by the victim machines. According Ruiu, malicious code first performed one of their computers when after installing a recent version of the iOS operating system X on a MacBook Air, the team decided to update the firmware automatically from the boot sequence (‘booting’ , in English), published ‘Ars Technica’. Later noticed security adviser files and settings disappearing for no apparent reason and that he could not ‘boot’ from a CD ROM. In the following months, this behavior began to spread among other computers in your network, including some with multiple variants Open BSD and Windows. “It was like, well, we totally dominated” said Ruiu a ‘Ars Technica’. “We have to clear all our systems and start from scratch, which we did. Was a very painful exercise.’ve Been suspecting all objects here ever since.” Ruiu then began a struggle of nearly three years to remove malware. During this time tried everything, even reinstalling operating systems from scratch and new hard drives, but the malware seemed ‘immortal’. The virus causes the devices that are within moderate start packet data transmitted together. For that reason decided to completely isolate the equipment, disconnect the Ethernet cable, removing the wifi and bluetooth cards and disconnecting from the mains, on battery power, but the packet transmission and the virus was still spreading. Ruiu’s last resort was to remove the internal speakers and microphone of a team, which finished with the packet transmission. This delivery system information through high-frequency sounds has been investigated in several laboratories, including a project undertaken by MIT. Despite the skepticism surrounding the announcement of potent virus is not the first time that a malicious code contained in the firmware appears. It is the case of Stuxnet, the virus that affected the control of uranium enrichment centrifuges Iran a few years ago.