Public Malicious Firmware Examples
The main purpose of this list is to demonstrate (1) the poor state of firmware security, and (2) some of the things that are possible with control over the firmware in various parts of a computer system. I shouldn't have to say this, but do not run out and do this to somebody else's computer system. The purpose of this site is to educate defenders in an effort to raise the bar. Please feel free to share more examples! Note: often threads (e.g., on news.ycombinator.com) discussing this kind of thing typically fill up with other interesting links.
2018
Intel
AMD
2017
CVE-2017-5689 - Intel AMT authentication bypass
2016
(off-topic, since there's nothing malicious here, but this is pretty cool) Color TV Broadcasts using a WiFi radio
2014
Rafal Wojtczuk, Corey Kallenberg: Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer
Rudolf Marek: AMD x86 SMU firmware analysis
Intel chipsec (defcon talk) "Platform Security Assessment Framework"
UEFI Update Capsule Coalesce Vulnerability (& lots more from the same group)
Absolute CompuTrace Revisited - http://securelist.com/analysis/publications/58278/absolute-computrace-revisited/
Hard drive firmware
Intel ME - http://recon.cx/2014/slides/Recon%202014%20Skochinsky.pdf
NSA ANT catalog - http://en.wikipedia.org/wiki/NSA_ANT_catalog
2013
Malicious phone chargers installing malware into phones - http://arstechnica.com/security/2013/07/trusting-iphones-plugged-into-bogus-chargers-get-a-dose-of-malware/
Printer firmware - http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
WiFi-enabled SD card - http://haxit.blogspot.ch/2013/08/hacking-transcend-wifi-sd-cards.html
WiFi router - http://shadow-file.blogspot.com/2013/10/complete-persistent-compromise-of.html
Web cam LED disabling
Toyota’s ECU (unintended acceleration - it was not floor mats) (not actively malicious):
Baseband processors - http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone
Stuxnet - "To Kill a Centrifuge - A Technical Analysis of What Stuxnet’s Creators Tried to Achieve" - http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf
2012 or older
Invisible Things Labs TXT,SMM,VT, etc
Loic Duflot et al (SMM stuff, …)
Arrigo Triulzi’s NIC+GPU ssh
K. Chen’s Apple keyboard
Stuxnet Dossier - http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf