Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Pre-OS Boot: Component Firmware

ID Name
T1542.001 System Firmware
T1542.002 Component Firmware
T1542.003 Bootkit

Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to System Firmware but conducted upon other system components/devices that may not have the same capability or level of integrity checking.

Malicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.

ID: T1542.002
Sub-technique of:  T1542
Tactics: Persistence, Defense Evasion
Platforms: Windows
System Requirements: Ability to update component device firmware from the host operating system.
Permissions Required: SYSTEM
Data Sources: API monitoring, Component firmware, Disk forensics, Process monitoring
Defense Bypassed: Anti-virus, File monitoring, Host intrusion prevention systems
Version: 1.0
Created: 19 December 2019
Last Modified: 23 March 2020

Procedure Examples

Name Description
Equation

Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.[1]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Data and telemetry from use of device drivers (i.e. processes and API calls) and/or provided by SMART (Self-Monitoring, Analysis and Reporting Technology) [2] [3] disk monitoring may reveal malicious manipulations of components. Otherwise, this technique may be difficult to detect since malicious activity is taking place on system components possibly outside the purview of OS security and integrity mechanisms.

Disk check and forensic utilities [4] may reveal indicators of malicious firmware such as strings, unexpected disk partition table entries, or blocks of otherwise unusual memory that warrant deeper investigation. Also consider comparing components, including hashes of component firmware and behavior, against known good images.

References