{"id":12934,"date":"2018-09-17T03:50:58","date_gmt":"2018-09-17T03:50:58","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/"},"modified":"2018-09-17T03:50:58","modified_gmt":"2018-09-17T03:50:58","slug":"youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/","title":{"rendered":"You&#8217;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it"},"content":{"rendered":"<div readability=\"30.608695652174\">\n<h2>Hardware hackers bring cold boot attacks out of the deep freeze<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/01\/23\/mr_freeze.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"\" width=\"442\" height=\"293\" class=\"article_img\"\/><\/p>\n<p>Chill out &#8230; Cold boot attacks are more naughty than ice<\/p>\n<\/div>\n<div id=\"body\" readability=\"91.503512880562\">\n<p><strong class=\"trailer\">Video<\/strong> If you can steal someone&#8217;s laptop, leave it switched on in sleep mode, crack it open, hook up some electronics to alter settings in the BIOS firmware, restart it, and boot into a custom program&#8230; you can swipe crypto keys and other secrets from the system.<\/p>\n<p>When computers are restarted, the motherboard firmware can wipe the RAM clean to remove any lingering data. It is possible to, while a stolen machine is still in sleep mode, reprogram the firmware&#8217;s settings to disable this memory zero&#8217;ing, and then reboot it into a custom operating system on a USB stick or similar that then scans the RAM for any sensitive information. This information can be used to decrypt encrypted hard drives, and so on.<\/p>\n<p>Whether or not it&#8217;s easier than smacking the laptop owner with a two-by-four until they give up their login password is, well, an exercise left to our more sociopathic readers.<\/p>\n<p>F-Secure&#8217;s Olle Segerdahl and Pasi Saarinen this week detailed <a target=\"_blank\" href=\"https:\/\/blog.f-secure.com\/cold-boot-attacks\/\">their memory-slurping technique<\/a>, effectively bringing cold boot attacks out of the deep freeze <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.usenix.org\/legacy\/event\/sec08\/tech\/full_papers\/halderman\/halderman.pdf\">from 2008<\/a> and putting them back into play. The pair reckon the approach will work against nearly all modern laptops, including Apple Macs.<\/p>\n<p>The hack is tricky, though once mastered, it can be replicated on any purloined machine. Below is a video demo&#8217;ing the attack.<\/p>\n<p><a href=\"https:\/\/youtu.be\/E6gzVVjW4yY\" data-media=\"x-videoplayer\">Youtube Video<\/a><\/p>\n<p>F-Secure shared its research with Microsoft, Intel, and Apple. The security biz helped the Windows maker update its <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-countermeasures\">guidance<\/a> on Bitlocker to mitigate against this type of data theft. According to Cupertino, Macs fitted with an Apple <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.apple.com\/en-us\/HT208862\">T2 chip<\/a> are not at risk, and older machines can be protected by setting a firmware password.<\/p>\n<p>\u201cIt takes some extra steps compared to the classic cold boot attack, but it\u2019s effective against all the modern laptops we\u2019ve tested. And since this type of threat is primarily relevant in scenarios where devices are stolen or illicitly obtained, it\u2019s the kind of thing an attacker will have plenty of time to execute,\u201d explained Segerdahl, principal security consultant at F-Secure.<\/p>\n<p>\u201cA quick response that invalidates access credentials will make stolen laptops less valuable to attackers,\u201c he added.<\/p>\n<p>F-Secure further advises companies to configure laptops so that hackers attempting this or similar variants of cold boot attacks will be left with nothing to steal:<\/p>\n<p>Segerdahl and Saarinenare are due to present their research at the SEC-T conference in Sweden this week, and at Microsoft\u2019s BlueHat v18 in the US on September 27. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/09\/14\/cold_boot_attack_reloaded\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hardware hackers bring cold boot attacks out of the deep freeze Video\u00a0 If you can steal someone&#8217;s laptop, leave it switched on in sleep mode, crack it open, hook up some electronics to alter settings in the BIOS firmware, restart it, and boot into a custom program&#8230; you can swipe crypto keys and other secrets from the system.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":12935,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-12934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>You&#039;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You&#039;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-17T03:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"You&#8217;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it\",\"datePublished\":\"2018-09-17T03:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/\",\"name\":\"You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg\",\"datePublished\":\"2018-09-17T03:50:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You&#8217;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/","og_locale":"en_US","og_type":"article","og_title":"You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-17T03:50:58+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"You&#8217;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it","datePublished":"2018-09-17T03:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/"},"wordCount":468,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/","url":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/","name":"You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg","datePublished":"2018-09-17T03:50:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/youll-never-guess-what-you-can-do-once-you-steal-a-laptop-reflash-the-bios-and-reboot-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"You&#8217;ll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/12934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=12934"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/12934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/12935"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=12934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=12934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=12934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}