System Firmware (T1542.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Persistence
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017. McAfee CHIPSEC Blog
Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015. MITRE Copernicus
Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved March 20, 2017. Intel HackingTeam UEFI Rootkit
Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017. Github CHIPSEC
UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016. About UEFI
Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016. MITRE Trustworthy Firmware Measurement
Wikipedia. (2017, July 10). Unified Extensible Firmware Interface. Retrieved July 11, 2017. Wikipedia UEFI
Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016. Wikipedia BIOS