T1542.003 Bootkit

Adversaries may use bootkits to persist on systems. Bootkits reside at a layer below the operating system and may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.

A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR). (Citation: Mandiant M Trends 2016) The MBR is the section of disk that is first loaded after completing hardware initialization by the BIOS. It is the location of the boot loader. An adversary who has raw access to the boot drive may overwrite this area, diverting execution during startup from the normal boot loader to adversary code. (Citation: Lau 2011)

The MBR passes control of the boot process to the VBR. Similar to the case of MBR, an adversary who has raw access to the boot drive may overwrite the VBR to divert execution during startup to adversary code.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.05 Remote access protection Mitigates T1542.003 Bootkit
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
    PR.AA-05.02 Privileged system access Mitigates T1542.003 Bootkit
    Comments
    This diagnostic statement protects against Bootkit through the use of privileged account management and the use of multi-factor authentication.
    References
      DE.CM-09.01 Software and data integrity checking Mitigates T1542.003 Bootkit
      Comments
      This diagnostic statement protects against Bootkit through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
      References
        PR.PS-01.03 Configuration deviation Mitigates T1542.003 Bootkit
        Comments
        This diagnostic statement provides protection from Bootkit through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baselining and integrity checking can help protect against adversaries attempting to compromise and modify software and its configurations.
        References
          PR.IR-01.06 Production environment segregation Mitigates T1542.003 Bootkit
          Comments
          This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
          References

            NIST 800-53 Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            CM-06 Configuration Settings mitigates T1542.003 Bootkit
            CM-05 Access Restrictions for Change mitigates T1542.003 Bootkit
            IA-08 Identification and Authentication (Non-Organizational Users) mitigates T1542.003 Bootkit
            SA-10 Developer Configuration Management mitigates T1542.003 Bootkit
            IA-07 Cryptographic Module Authentication mitigates T1542.003 Bootkit
            RA-09 Criticality Analysis mitigates T1542.003 Bootkit
            SC-34 Non-modifiable Executable Programs mitigates T1542.003 Bootkit
            SI-02 Flaw Remediation mitigates T1542.003 Bootkit
            CM-08 System Component Inventory mitigates T1542.003 Bootkit
            SI-07 Software, Firmware, and Information Integrity mitigates T1542.003 Bootkit
            CM-02 Baseline Configuration mitigates T1542.003 Bootkit
            SA-11 Developer Testing and Evaluation mitigates T1542.003 Bootkit
            IA-02 Identification and Authentication (Organizational Users) mitigates T1542.003 Bootkit
            AC-02 Account Management mitigates T1542.003 Bootkit
            AC-03 Access Enforcement mitigates T1542.003 Bootkit
            AC-05 Separation of Duties mitigates T1542.003 Bootkit
            AC-06 Least Privilege mitigates T1542.003 Bootkit
            CM-03 Configuration Change Control mitigates T1542.003 Bootkit

            VERIS Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            action.malware.variety.Rootkit Rootkit (maintain local privileges and stealth) related-to T1542.003 Bootkit

            Azure Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            ai_security_recommendations Microsoft Defender for Cloud: AI Security Recommendations technique_scores T1542.003 Bootkit
            Comments
            This control's "Secure Boot should be enabled on your Linux virtual machine" and "Virtual machines should be attested for boot integrity health" recommendations can lead to enabling secure boot on Linux VMs to mitigate these sub-techniques. Because this recommendation is specific to Linux VM and is a recommendation, its score is capped at Partial.
            References

            GCP Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            security_command_center Security Command Center technique_scores T1542.003 Bootkit
            Comments
            SCC is able to detect when secure boot is not enabled. Adversaries may use this weakness to abuse pre-boot mechanisms and persist on compromised systems (e.g., bootkit). This technique was graded as significant due to the high detect coverage and near real-time temporal factor.
            References