Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

New ‘Black Lotus’ UEFI Rootkit Provides APT-Level Capabilities

A threat actor is promoting on underground criminal forums a vendor-independent UEFI rootkit that can disable security software and controls, cybersecurity veteran Scott Scheferman warns.

A threat actor is promoting on underground criminal forums a vendor-independent UEFI rootkit that can disable security software and controls, cybersecurity veteran Scott Scheferman warns.

Dubbed ‘Black Lotus’, the Windows rootkit is a powerful, persistent tool being offered for sale at $5,000, with $200 payments per new version and featuring capabilities resembling those employed by state-sponsored threat actors.

Written in Assembly and C, Black Lotus is 80 kilobytes in size and features geofencing, to avoid infecting countries in the CIS region.

According to Scheferman, the threat packs evasion capabilities such as anti-virtualization, anti-debugging, and code obfuscation, and can disable security applications and defense mechanisms on target machines, including Hypervisor-protected Code Integrity (HVCI), BitLocker, and Windows Defender.

By loading code before the booting process completes, the rootkit can bypass user access control (UAC) and secure boot, it can load unsigned drivers, and can persist undetected in the UEFI firmware of the target device, supposedly indefinitely.

Black Lotus, Scheferman says, provides a full set of capabilities to attackers, including file transfer and tasking support, and can potentially become a major threat across IT and OT environments.

“Considering this tradecraft used to be relegated to APTs like the Russian GRU and APT 41 (China nexus), and considering prior criminal discoveries we’ve made (e.g. Trickbot’s #Trickboot module), this represents a bit of a ‘leap’ forward, in terms of ease of use, scalability, accessibility and most importantly, the potential for much more impact in the forms of persistence, evasion and/or destruction,” Scheferman says.

According to Scheferman, Black Lotus supposedly being able to target a broad range of device types might suggest that its developers are targeting an undocumented bootloader vulnerability impacting many vendors.

Advertisement. Scroll to continue reading.

Kaspersky too got wind of Black Lotus, pointing out that the rootkit’s advanced capabilities were previously typical of nation-state malware, but are now increasingly accessible to cybercriminals.

Related: Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards

Related: Avast: New Linux Rootkit and Backdoor Align Perfectly

Related: Sophisticated iLOBleed Rootkit Targets HP Servers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.