Blog | G5 Cyber Security

BIOS & HDD Passwords: Stopping Evil Maid Attacks

TL;DR

Using both a BIOS (UEFI) password and a full-disk encryption (HDD/SSD) password significantly improves protection against evil maid attacks, but isn’t foolproof. The BIOS password prevents boot from untrusted media, while disk encryption protects data if the drive is stolen or tampered with. Regular security checks are vital.

What is an Evil Maid Attack?

An evil maid attack involves someone physically accessing your computer (while it’s off) to install malicious software or alter boot settings, allowing them to compromise your system when you next turn it on. They might replace the operating system with a compromised version, add backdoors, or steal data.

How BIOS and HDD Passwords Help

These passwords create layers of security that make an evil maid attack much harder. Here’s how:

1. Set a Strong BIOS (UEFI) Password

  1. Access the BIOS/UEFI Setup: Restart your computer and press the key shown on the startup screen (usually Delete, F2, F10, or Esc). The exact key varies by manufacturer.
  2. Find the Password Setting: Look for options like “Supervisor Password”, “Setup Password”, or similar under Security settings.
  3. Create a Strong Password: Use a long, complex password that isn’t used anywhere else. Avoid easily guessable words or personal information.
  4. Save and Exit: Save the changes in the BIOS/UEFI setup before exiting.

What it does: This prevents someone from booting your computer from a USB drive, CD/DVD, or network without knowing the password. They can’t easily replace your operating system.

2. Enable Full-Disk Encryption

  1. Windows (BitLocker):
  • macOS (FileVault):
  • Linux (LUKS/dm-crypt): The process varies depending on your distribution. Use tools like cryptsetup during installation or after with distributions such as Ubuntu.
    sudo cryptsetup luksFormat /dev/sdX  # Replace sdX with your drive identifier
  • What it does: This encrypts the entire contents of your hard drive. Even if someone steals your drive, they can’t read the data without the password.

    3. Combining BIOS and HDD Passwords

    Using both passwords together creates a stronger defense:

    4. Regular Security Checks

    1. Check Boot Order: Regularly verify that your boot order in the BIOS/UEFI setup hasn’t been changed. It should prioritize your trusted operating system drive.
    2. Inspect for Tampering: Visually inspect your computer for any physical signs of tampering (e.g., opened cases, loose screws).
    3. Verify System Integrity: Use tools to check the integrity of your operating system files. For example:
      • Windows: sfc /scannow in an elevated command prompt.
      • macOS: Disk Utility’s First Aid feature.
      • Linux: Use package managers to verify file integrity (e.g., apt update && apt upgrade --reinstall $(dpkg -l | grep ^ii | awk '{print $2}') on Debian/Ubuntu).

    Limitations

    Exit mobile version