Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

New ‘Black Lotus’ UEFI Rootkit Provides APT-Level Capabilities

A threat actor is promoting on underground criminal forums a vendor-independent UEFI rootkit that can disable security software and controls, cybersecurity veteran Scott Scheferman warns.

A threat actor is promoting on underground criminal forums a vendor-independent UEFI rootkit that can disable security software and controls, cybersecurity veteran Scott Scheferman warns.

Dubbed ‘Black Lotus’, the Windows rootkit is a powerful, persistent tool being offered for sale at $5,000, with $200 payments per new version and featuring capabilities resembling those employed by state-sponsored threat actors.

Written in Assembly and C, Black Lotus is 80 kilobytes in size and features geofencing, to avoid infecting countries in the CIS region.

According to Scheferman, the threat packs evasion capabilities such as anti-virtualization, anti-debugging, and code obfuscation, and can disable security applications and defense mechanisms on target machines, including Hypervisor-protected Code Integrity (HVCI), BitLocker, and Windows Defender.

By loading code before the booting process completes, the rootkit can bypass user access control (UAC) and secure boot, it can load unsigned drivers, and can persist undetected in the UEFI firmware of the target device, supposedly indefinitely.

Black Lotus, Scheferman says, provides a full set of capabilities to attackers, including file transfer and tasking support, and can potentially become a major threat across IT and OT environments.

“Considering this tradecraft used to be relegated to APTs like the Russian GRU and APT 41 (China nexus), and considering prior criminal discoveries we’ve made (e.g. Trickbot’s #Trickboot module), this represents a bit of a ‘leap’ forward, in terms of ease of use, scalability, accessibility and most importantly, the potential for much more impact in the forms of persistence, evasion and/or destruction,” Scheferman says.

According to Scheferman, Black Lotus supposedly being able to target a broad range of device types might suggest that its developers are targeting an undocumented bootloader vulnerability impacting many vendors.

Advertisement. Scroll to continue reading.

Kaspersky too got wind of Black Lotus, pointing out that the rootkit’s advanced capabilities were previously typical of nation-state malware, but are now increasingly accessible to cybercriminals.

Related: Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards

Related: Avast: New Linux Rootkit and Backdoor Align Perfectly

Related: Sophisticated iLOBleed Rootkit Targets HP Servers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Stephanie Crowe has been appointed head of the Australian Cyber Security Centre (ACSC).

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.