In a statement, the company said modern security tools had concentrated on detecting attacks at the operating system level and above. They provided little visibility into lower levels of computing platforms and attackers, looking to maintain stealth and persistence, had targeted the BIOS.
This type of infection was difficult to detect and could persist across reboots and reinstallation of the operating system, the company said.
Such malicious firmware updates could be delivered though standard intrusion techniques, such as spear-phishing, or come pre-installed on a machine via attacks on the supply chain, CrowdStrike said.
CrowdStrike said Falcon would be the first endpoint protection platform to provide visibility into these threats.
Falcon works by collecting details on BIOS images and configuration, and delivers enterprise-wide firmware visibility via the cloud-native Falcon Platform console.
The platform integrates with Dell SafeBIOS to enable enhanced detection for BIOS/firmware based threats on Dell systems.
“Today’s persistent nation-state actors have already begun migrating to BIOS attacks as their next preferred environment for persistence and malicious control of systems," said Alex Ionescu, vice-president of EDR strategy at CrowdStrike.
"With security researchers and companies around the world showcasing various attacks against Intel Boot Guard, Secure Boot, Intel CSME, AMD PSP and other core platform security technologies, it’s only a matter of time until such techniques become commoditised by an even wider spectrum of attackers .
“As a leading cyber security company at the forefront of security research, CrowdStrike remains dedicated to providing our customers both firmware and hardware-level visibility into these vulnerabilities and attacks even before they have a chance to take off – and perhaps to even discover dormant threats that had so far been unseen.”
CrowdStrike plans to release the results of its research, as well as the technology it uses to capture firmware data, at future cyber security conferences.
In 2016, CrowdStrike was in the news after it was called in following the breach of servers belonging to the Democrat National Committee. The company is yet to issue a detailed explanation of its role in that incident.