Malware
Firmware Malware
Also known as: Firmware implant, Below-OS malware
Definition
Malicious code that lives in device firmware — BIOS/UEFI, network cards, drives, or peripherals — surviving OS reinstalls and most endpoint defences.
Examples
- LoJax UEFI implant attributed to Sednit/APT28.
- MoonBounce firmware implant that loads from SPI flash.
Related terms
UEFI Rootkit
A rootkit implanted in UEFI firmware that loads before the OS, persists across disk wipes, and bypasses most endpoint security.
BIOS Rootkit
A rootkit that infects legacy BIOS firmware so it executes before the operating system, achieving deep persistence below the OS.
Bootkit
Malware that infects the boot process — MBR, VBR, or UEFI — to load before the operating system and obtain persistent, privileged control.
Rootkit
Stealth malware that grants and hides privileged access to an operating system or device, evading detection by standard tools.
Supply Chain Attack
An attack that compromises a trusted third-party software, hardware, or service provider in order to reach its downstream customers.
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) — definition coming soon.