Executive Summary: By April 2026, threat actors have weaponized undocumented UEFI boot services to establish stealthy firmware implants that persist across OS reinstallations, secure boot resets, and even hardware replacements. These attacks exploit previously undocumented or poorly documented interfaces within the UEFI firmware ecosystem, enabling persistent, high-privilege footholds in enterprise, government, and critical infrastructure environments. This report analyzes the evolution of such mechanisms, identifies key attack vectors, and provides actionable defensive recommendations for organizations to mitigate this emerging class of threats.
RuntimeServices->GetVariableEx, BootServices->ConnectControllerEx) that bypass standard security checks and are rarely audited by firmware vendors.UEFI firmware provides a rich set of boot and runtime services defined in the EFI_BOOT_SERVICES and EFI_RUNTIME_SERVICES tables. While many interfaces are standardized (e.g., ExitBootServices, SetVirtualAddressMap), a large number of "shadow services" remain undocumented or vendor-specific. These include:
GetVariableEx (AMI): Extends variable access with relaxed authentication checks.ConnectControllerEx (Insyde): Allows dynamic binding of drivers with elevated privileges.SetWatchdogTimerEx (Phoenix): Modifies watchdog behavior without standard logging.CreateEventEx2 (Custom OEM): Enables event-driven code execution in pre-boot environments.Attackers are reverse-engineering these interfaces using leaked firmware binaries, debug logs, and fuzzing campaigns. Once discovered, they are weaponized to:
EFI_EVENT_GROUP_READY_TO_BOOT) to trigger secondary implants.Modern firmware implants follow a modular, stealth-focused design:
Implants are delivered via:
BufferOverflowInSMM (CVE-2025-3410).Persistence is achieved through:
BootXXXX) store encrypted payloads and execution triggers.EFI_BOOT_SERVICES->InstallProtocolInterface and hook critical protocols (e.g., EFI_SIMPLE_FILE_SYSTEM_PROTOCOL).MMIO_BASE + 0x1000000) to store state without detection.To evade detection, implants incorporate:
EFI_PCI_IO_PROTOCOL) to exfiltrate data via covert side channels.Threat groups have operationalized these techniques:
A suspected APT41 subgroup exploited an undocumented GetVariableEx interface in AMI Aptio firmware to implant a rootkit dubbed "SilentBoot." The implant persisted across OS reinstalls and survived secure boot recovery by re-injecting itself during the next firmware update cycle. The group used a custom toolkit to automate variable manipulation and encryption key rotation.
A compromised firmware image for Dell PowerEdge servers included a malicious DXE driver that registered a custom protocol. Upon boot, the driver would check a remote C2 server for instructions, downloading additional payloads via EFI_SIMPLE_NETWORK_PROTOCOL in pre-boot. The campaign went undetected for 14 months due to lack of firmware integrity monitoring.
Researchers at MITRE discovered a firmware implant that used a 2-layer TinyML model to detect runtime analysis tools (e.g., UEFITool, Chipsec). If analysis was detected, the implant would enter a dormant state or redirect execution to a decoy firmware region. The model was trained on public firmware samples and fine-tuned in the field via C2.
Organizations must adopt a multi-layered defense strategy to counter these threats:
fwupd with custom plugins) to validate firmware images against vendor checksums and cryptographic signatures.BootXXXX, OsIndication).recovery.