Re: Detection
If you read the full description from the guy to reversed engineered the hack, it was pointed out that the firmware could be made passive and simply respond to specific packets being written - including a certain filename. e.g the_register.gif.
This is by far the most scary of exploits because the storage is compromised such that even encrypting the disk is not guaranteed, since the firmware may look for key signatures.
Scary huh?
P.