logo logo

The next-generation blog, news, and magazine theme for you to start sharing your stories today!

The Blogzine

Save on Premium Membership

Get the insights report trusted by experts around the globe. Become a Member Today!

View pricing plans

New York, USA (HQ)

750 Sing Sing Rd, Horseheads, NY, 14845

Call: 469-537-2410 (Toll-free)

hello@blogzine.com

Microsoft posts guide for Windows Secure Boot, Defender, VBS, BitLocker-bypassing BlackLotus

avatar
Louis Ferguson

An editor at Blogzine


  • 🕑 2 minutes read
  • 2 Views
Microsoft posts guide for Windows Secure Boot, Defender, VBS, BitLocker-bypassing BlackLotus

Last month, WeLiveSecurity, the security research wing of ESET anti-malware solutions, released its report on the BlackLotus security vulnerability.

If you aren’t aware, BlackLotus is a UEFI bootkit, and what makes this malware particularly dangerous is its ability to bypass Secure Boot systems even on updated Windows 11 systems. Besides that, BlackLotus also makes modifications to the registry to disable Hypervisor-protected Code Integrity (HVCI), which is a Virtualization-based Security (VBS) feature; as well as BitLocker encryption. It also disables Windows Defender by manipulating the Early Launch Anti-Malware (ELAM) driver and Windows Defender file system filter driver. The ultimate purpose is to deploy an HTTP downloader which delivers the malicious payloads.

Although the security vulnerability dubbed “Baton Drop”(CVE-2022-21894) was patched a year ago, it is still exploited as signed binaries have not yet been added to the UEFI revocation list. In a recently published guidance, Microsoft has summarized the malicious activities BlackLotus does after it has managed to infest:

The malware uses CVE-2022-21894 (also known as Baton Drop) to bypass Windows Secure Boot and subsequently deploy malicious files to the EFI System Partition (ESP) that are launched by the UEFI firmware. This allows the bootkit to:

  1. Achieve persistence by enrolling the threat actor’s Machine Owner Key (MOK)
  2. Turn off HVCI to allow deployment of a malicious kernel driver
  3. Leverage the kernel driver to deploy the user-mode HTTP downloader for command and control (C2)
  4. Turn off Bitlocker to avoid tamper protection strategies on Windows
  5. Turn off Microsoft Defender Antivirus to avoid further detection

In its guidance, the tech giant has covered, in detail, the techniques to determine if the devices in an organization are infected, as well as recovery and prevention strategies. You can read it on Microsoft’s official website.



Leave a Reply

Your email address will not be published. Required fields are marked *