Security News > 2023 > June > NSA shares tips on blocking BlackLotus UEFI malware attacks
The U.S. National Security Agency released today guidance on how to defend against BlackLotus UEFI bootkit malware attacks.
In May, Microsoft released security updates to address a Secure Boot zero-day vulnerability that was used to bypass patches released for CVE-2022-21894, the Secure Boot bug initially abused in BlackLotus attacks last year.
"NSA recommends system administrators within DoD and other networks take action. BlackLotus is not a firmware threat, but instead targets the earliest software stage of boot," the NSA said.
Customize UEFI Secure Boot to block older, signed Windows boot loaders.
BlackLotus has been used in attacks targeting Windows 10 and 11 to exploit a vulnerability found in older boot loaders which helps bypass Secure Boot protection and trigger a series of malicious actions designed to compromise system security.
"However, patches were not issued to revoke trust in unpatched boot loaders via the Secure Boot Deny List Database. Administrators should not consider the threat fully remediated as boot loaders vulnerable to Baton Drop are still trusted by Secure Boot," the NSA said.
News URL
Related news
- Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack (source)
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-11 | CVE-2022-21894 | Unspecified vulnerability in Microsoft products Secure Boot Security Feature Bypass Vulnerability | 4.4 |