0.1.14 BIOS / UEFI β the pre-OS whisper
In one line: BIOS / UEFI is the tiny firmware program that wakes up before Windows or Linux β and if an attacker owns it, your antivirus will never know.
A story β the firmware that survived Stalin
In 1981 IBM put a small read-only chip on the original PCβs motherboard. On power-on, the CPUβs program counter started at a fixed address pointing into that chip β and the few KB of code stored there would do the absolute minimum needed to bring the machine to life: test RAM, find a boot disk, hand off control. They called it the Basic Input/Output System β BIOS.
For 30 years, BIOS was almost unchanged. Then in the late 2000s, Intel pushed a replacement called UEFI (Unified Extensible Firmware Interface) β bigger, fancier, supports drives over 2 TB, has a proper interactive menu, and can run signed firmware to verify the OS hasnβt been tampered with (Secure Boot).
Then in 2018, ESET researchers found LoJax β the first BIOS-resident malware in the wild. Russian state actors (Fancy Bear / APT28) had figured out how to write to the SPI flash chip that holds UEFI firmware. Reformatting the disk didnβt help. Reinstalling Windows didnβt help. Replacing the SSD didnβt help. The malware was in the motherboardβs firmware chip, surviving every wipe, ready to redeploy itself the moment a fresh OS booted. Welcome to the era of bootkits.
In 2023, BlackLotus went further β the first known bootkit that bypasses Secure Boot on fully-patched Windows 11. Once installed, it disables Defender, BitLocker, HVCI, and gives the attacker SYSTEM-level persistence that survives reinstalls.
Whatβs actually going on
The firmware chip on the motherboard (an SPI flash chip, typically 8-32 MB) holds the UEFI firmware. On power-on:
- The CPU starts executing from a fixed reset vector β usually pointing into that firmware chip.
- UEFI runs through POST (Power-On Self Test): test RAM, init chipset, init USB, init storage controllers.
- UEFI loads a bootloader (Windows Boot Manager, GRUB, systemd-boot) from the EFI System Partition on the boot drive.
- Bootloader loads the OS kernel.
- Kernel takes over. UEFI stops being the conductor.
UEFI also offers a setup menu (the screen you get when you mash F2 / Del / F10 at boot). From there you set boot order, enable/disable Secure Boot, configure RAM speeds (XMP), enable virtualisation (VT-x / AMD-V).
Secure Boot is UEFIβs signed-code feature: only bootloaders signed by trusted keys (Microsoftβs, by default) are allowed to run. Designed to stop bootkits. Mostly works β until somebody finds a vulnerable signed loader, like BlackLotus did.
Why a hacker cares
BIOS/UEFI is the highest-value persistence in computing, for both attackers and defenders:
- Bootkits (LoJax, BlackLotus, MosaicRegressor) survive disk wipes, OS reinstalls, even drive replacement. The only fix is reflashing the firmware chip β and many users donβt know thatβs even possible.
- Implants below the OS can hide from every antivirus because antivirus runs inside the OS, and the OS doesnβt know the firmware has been compromised.
- Supply chain attacks β compromise the manufacturerβs firmware update server and you ship backdoored firmware to every customer. (See: ASUS Live Update incident, 2019.)
- Intel ME / AMD PSP β separate processors inside modern chipsets, running their own firmware. Out-of-band remote management. Vulnerabilities here let attackers control a machine even when itβs βoff.β
Defences:
- Secure Boot enabled β block unsigned bootloaders.
- Set a UEFI password β stops the casual βpress F2 and change boot orderβ attacker.
- Keep firmware updated β vendors release security patches. Most users never apply them.
- Measure boot integrity with the TPM chip β it can attest to remote servers that your firmware hashes are unchanged from a known-good state.
In one sketch
power on
β
βΌ
βββββββββββββββ
β UEFI / BIOS β β lives in SPI flash on motherboard
ββββββββ¬βββββββ
β POST, init hardware, find boot device
βΌ
βββββββββββββββ
β Bootloader β β lives in EFI System Partition on disk
ββββββββ¬βββββββ
β load kernel
βΌ
βββββββββββββββ
β OS Kernel β β lives in OS partition
βββββββββββββββ
bootkit lives βββ here βββ β invisible to OS-level AV
Reference and image credit
- AMIBIOS.jpg β Hansiman33xd, CC0.
Memory peg
BIOS/UEFI runs before the OS. Whoever controls the firmware controls the machine before the OS gets a chance to defend itself.