CAPEC 638 Altered Component Firmware

Stable Detailed Low Risk
Severity Very High

Description

An adversary exploits systems features and/or improperly protected firmware of hardware components, such as Hard Disk Drives (HDD), with the goal of executing malicious code from within the component's Master Boot Record (MBR). Conducting this type of attack entails the adversary infecting the target with firmware altering malware, using known tools, and a payload. Once this malware is executed, the MBR is modified to include instructions to execute the payload at desired intervals and when the system is booted up. A successful attack will obtain persistence within the victim system even if the operating system is reinstalled and/or if the component is formatted or has its data erased.

Attack Execution Flow

4

Mitigations

2

Consequences

Indicators

2

Relationships

Related ATT&CK Techniques

1

Resources Required

3