Home Cyber Security BlackLotus bootkit patch could deliver “false sense of safety”, warns NSA

BlackLotus bootkit patch could deliver “false sense of safety”, warns NSA

0
BlackLotus bootkit patch could deliver “false sense of safety”, warns NSA

[ad_1]

The NSA has revealed a information about mitigate towards assaults involving the BlackLotus bootkit malware, amid fears that system directors will not be adequately protected towards the menace.

The BlackLotus UEFI bootkit made a reputation for itself in October 2022, when it was seen being bought on cybercrime underground boards for $5,000.

The information despatched a shiver down the spines of many within the cybersecurity group, as BlackLotus was the primary in-the-wild UEFI bootkit able to bypassing UEFI Safe Boot on totally up to date UEFI techniques.

BlackLotus is a classy piece of malware that may infect a pc’s low-level firmware, bypassing the Safe Boot defences constructed into Home windows 10 and Home windows 11, and permitting the execution of malicious code earlier than a PC’s working system and safety defences have loaded.

On this method, attackers may disable safety measures similar to BitLocker and Home windows Defender, with out triggering alarms, and deploy BlackLotus’s built-in safety towards the bootkit’s personal elimination.

Though Microsoft issued a patch for the flaw in Safe Boot again in January 2022, its exploitation stays attainable because the affected, validly-signed binaries haven’t been added to the UEFI revocation listing.

Earlier this yr, safety researchers defined how BlackLotus was making the most of this, “bringing its personal copies of official – however weak – binaries to the system to be able to exploit the vulnerability.”

In keeping with the NSA, there’s “vital confusion” concerning the menace posed by BlackLotus:

“Some organizations use phrases like ‘unstoppable,’ ‘unkillable,’ and ‘unpatchable’ to explain the menace. Different organizations imagine there is no such thing as a menace attributable to patches that Microsoft launched in January 2022 and early 2023 for supported variations of Home windows. The danger exists someplace between each extremes.”

In keeping with the NSA’s advisory, patching Home windows 10 and Home windows 11 towards the vulnerabilities is barely “a superb first step.”

In its mitigation information, the company particulars extra steps for hardening techniques.

Nonetheless, as they contain modifications to how UEFI Safe Boot is configured they need to be undertaken with warning – as they can’t be reversed as soon as activated, and will go away present Home windows boot media unusable if errors are made.

“Defending techniques towards BlackLotus shouldn’t be a easy repair,” mentioned NSA platform safety analyst Zachary Blum.


Editor’s Observe: The opinions expressed on this visitor writer article are solely these of the contributor, and don’t essentially mirror these of Tripwire.

[ad_2]