T1542.002: Component Firmware
View on MITRE ATT&CK | T1542.002 |
---|---|
Tactic(s) | Persistence, Defense Evasion |
Associated CAPEC Patterns | Exploitation of Thunderbolt Protection Flaws (CAPEC-665) , Altered Component Firmware (CAPEC-638) |
Data from MITRE ATT&CK®:
Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to System Firmware but conducted upon other system components/devices that may not have the same capability or level of integrity checking.
Malicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.
© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
Cyber Threat Graph Context
Explore how this ATT&CK Technique relates to the wider threat graph
Mitigations for this technique
MITRE ATT&CK Mitigations
How to detect this technique
MITRE ATT&CK Data Components