The tool attacks a device’s UEFI firmware—which makes it especially hard to detect and destroy.