T1542.002: Component Firmware
Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to System Firmware but conducted upon other system components/devices that may not have the same capability or level of integrity checking.
Malicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.
Positive Technologies products that cover the technique
Description of detection methods is not available yet
Detection
ID | DS0001 | Data source and component | Firmware: Firmware Modification | Description | Monitor for changes that may reveal indicators of malicious firmware such as strings. Also consider comparing components, including hashes of component firmware and behavior, against known good images. |
---|
ID | DS0009 | Data source and component | Process: OS API Execution | Description | Monitor for API calls associated with the use of device drivers and/or provided by SMART (Self-Monitoring, Analysis and Reporting Technology) disk monitoring may reveal malicious manipulations of components. Otherwise, this technique may be difficult to detect since malicious activity is taking place on system components possibly outside the purview of OS security and integrity mechanisms. |
---|
ID | DS0027 | Data source and component | Driver: Driver Metadata | Description | Monitor for unexpected disk partition table entries, or blocks of otherwise unusual memory that warrant deeper investigation |
---|
Mitigation
ID | M1051 | Name | Update Software | Description | Perform regular firmware updates to mitigate risks of exploitation and/or abuse. |
---|