It seems all bios's, particularly those with draft/standard tpm
      and uefi, and some earlier acpi mainboards all have the same
      security problem, which appears to be deliberate since windows
      seems to use it on purpose..  
      (Tinfoil hat thought: Probably explains why Microsoft is pushing
      so hard for all windows 11 machines to require these, since they
      have always complied with backdoor feature requests from
      NSA/CIA/FBI)
      
      Problem seems to exist in all AMD and Intel mainboards, with or
      without intelME and AMD's knock off of IntelMe.  Although
      certainly those with IntelME can do a lot more damage since they
      can be keyed to boot virtual disks/rootkits remotely, and in
      practice function somewhat like a hardware layer version of VNC
      server, with remote image mounting capability.  Machines are
      vulnerable regardless of OS, disk encryption, security measures or
      firewalls.   (although in most cases the user is the weakest point
      in social engineering a rootkit being installed with this
      capability)
      
      Symptoms:
      Machines turn on by themselves after being fully powered down by
      the OS, suspiciously these power up events often disable start up
      sounds and the like when being used for nefarious purposes.   The
      system will detect if the local user has noticed (such as shutting
      it down again or doing a hard power off) and enable the startup
      sound again for the next startup cycle to discourage suspicion.   
      Hibernated machines also generally wont trigger the startup sound
      as well when powering up by themselves.  (even if you don't use
      hibernation - "fast start" is in effect using hibernation, and
      dells have a "hybrid sleep" mode which is a hardware level
      hibernation capability attached to simple sleep mode) In general
      most windows machines will 'legitimately' attempt to turn
      themselves on at or after 3am, but the behaviour can occur at any
      time depending on clock and time zone settings, and seems to be
      prepared in advanced by the OS under the pretext of installing
      updates, so it will not happen EVERY night - more often at random.
      
      In a nutshell:
      These bios's can:
      1: Be interfered with by the OS to trigger a startup event at
      defined time/date.   This event behaves like someone walked up and
      hit the power button, and wont show in your scheduled start bios
      configuration. Current versions of windows do this to circumvent
      defined bios power/startup/schedule behaviour settings in order to
      force it to turn the PC on (usually around 3am) to 'legitimately'
      install updates and likely to comply with patriot act provisions
      allowing rooting 'person of interest' computers.  Additionally
      these are vulnerable to uefi console level attacks which can add
      IntelMe like rootkits to machines without remote management
      hardware.
    
2: Additional capabilities are available if the mainboard is
      using on board network hardware, such as wake on lan, magic packet
      and the like - which will allow access to additional remote
      management features outside of the OS level.
    
How can these be exploited:
      Using trojans or typical social engineering, apps can be installed
      which configure a computer to power itself up at a time it may be
      unattended, facilitating remote access to a remote rogue operator.
      Metrics/telemetry data make this even easier, as it will tell the
      rogue operator exactly what times the machine it turned off or
      idle.  Additionally once a machine has been compromised, it can be
      used to exploit wake-on-lan and IntelME style features installed
      on any other machine contained within the same network as the
      initial exploited machine - in effect granting access to every
      available computer in a LAN too.
    
Fixes:
    
That's it.  It is an old problem, but worth reminding
      everyone.     
    
-- New and improved 2600... well.. ..we drew on some flames and polished it a bit.. -- Google - making sure, life is no more, than 1984... -- Bill Gates: 640k is more than enough for anybody PC guy down the road: You will never fill that 10mb Hard disk mate Abbott/Turnbull: 25Mbps is "more than enough" for the average Australian household. Turnbull: Actually 10MBs is enough for the average household really. Abbott/Turnbull: It is cheaper to put in FTTN, you get up to 24mbs/down and 256k up.. we can upgrade it more later...