Microsoft explains how to detect a BlackLotus UEFI bootkit infection

Alfonso Maruccia

Posts: 1,025   +301
Staff
What just happened? Months after researchers discovered the dangerous, "invisible" threat posed by BlackLotus, Microsoft is now giving investigators and sysadmins a detailed guidance over the telltale signs of an ongoing infection.

BlackLotus is an all-powerful UEFI bootkit recently discovered "in the wild," a security threat equipped with very advanced capabilities and designed to turn itself into an invisible ghost within a fully updated Windows machine. Even though the infection is effectively transparent to normal usage, researchers and analysts have now enough knowledge about the system changes brought by the malware.

Microsoft has put together a guidance for investigating (and, of course, detecting) the BlackLotus campaign, which is first designed to exploit the CVE-2022-21894 security flaw ("Secure Boot Security Feature Bypass Vulnerability") fixed by Redmond in January 2022. UEFI bootkits are particularly dangerous as they run at computer startup before the operating system is loaded, Microsoft explains, therefore they can interfere with or deactivate various OS security mechanisms.

According to Microsoft's guide, researchers and administrators must search specific (hidden) parts of a Windows installation to identify the clues of a BlackLotus infection. The telltale signs of the bootkit presence include recently created and locked boot files, a staging directory used during the BlackLotus installation, Registry key changes to disable the Hypervisor-protected Code Integrity (HVCI) feature, and network and boot logs.

To investigate the potential modifications to the boot process, Microsoft says, "threat hunters" first need to mount the EFI system partition that is usually hidden from everyday Windows use. Then they have to check the modification date of the EFI files protected by the BlackLotus kernel driver, searching for mismatches between earlier and the most recent files. The recent ones would likely be associated with the bootkit infection.

A BlackLotus infection can also be detected by searching for a "system32" folder within the EFI partition, which is the location where the malware installation is started. BlackLotus also modifies the Windows Registry to disable HVCI, while the Defender antivirus doesn't start anymore. Investigators can search for traces in the Windows Event Logs, including an "ID 7023" event generated when the Defender real-time protection service gets stopped "for an unknown reason."

Logs of outbound connections from winlogon.exe on port 80 can also reveal BlackLotus presence on the machine, as the bootkit's injected HTTP loader tries to reach the command&control server or perform "network configuration discovery." When the bootkit becomes active, Microsoft explains, two new boot drivers ("grubx64.efi," "winload.efi") can be seen by comparing logs.

Microsoft also provides instructions on how to prevent and remove a BlackLotus infection. Prevention is the best solution against traditional and invisible threats, Microsoft suggests, and system administrators should first avoid the use of domain-wide, admin-level service accounts by restricting local administrative privileges. Implementing multiple layers of security controls is the only strategy that can reduce risks, while disinfection can be done but requires a careful reinstallation of a clean operating system, EFI partition and UEFI firmware.

Permalink to story.

 
How is the average person supposed to combat this? You need a college degree in computer science to understand this!!🤬🤬

I agree, that's how many people feel about the constant parade of 'viruses' on Windows machines. But you don't need a BS in software engineering to deal with it. Just reinstall Windows and reflash the bios.

The big question is why MS doesn't just fix the problem. Are they that helpless?

The whole thing is a farce.
 
I agree, that's how many people feel about the constant parade of 'viruses' on Windows machines. But you don't need a BS in software engineering to deal with it. Just reinstall Windows and reflash the bios.

The big question is why MS doesn't just fix the problem. Are they that helpless?

The whole thing is a farce.

I suppose these mythical rootkits than can hide on reformatted C drives - secret places on MB are not really a concern with average joes .

But I suppose best for simple folk with sophisticated rootkits to do as you say - plus a full Cdrive reformat - or just get a new bigger one you always wanted .
 
I agree, that's how many people feel about the constant parade of 'viruses' on Windows machines. But you don't need a BS in software engineering to deal with it. Just reinstall Windows and reflash the bios.

The big question is why MS doesn't just fix the problem. Are they that helpless?

The whole thing is a farce.
The ones they are talking about are on the motherboards themselves, I saw an article about how the root kit was injected in the motherboard by evil people during the motherboard's manufacture!:mad: Had a friend at work threw his windows PC in the trash years ago and bought a MAC because he was tired of the viruses. I have had a PC since 1998 and only had 1 virus in all those years (was able to clean it off). I had free antivirus's up until Win 10, now just use defender and Malwarebytes. I only had to nuke one win 7 machine and seemed to be from Windows ROT! Still have two Socket 775 machines with win 10 (upgraded from Win7) on them from 2011 running fine for back-up machines!😁😁
:mad:
 
I agree, that's how many people feel about the constant parade of 'viruses' on Windows machines. But you don't need a BS in software engineering to deal with it. Just reinstall Windows and reflash the bios.

The big question is why MS doesn't just fix the problem. Are they that helpless?

The whole thing is a farce.

They can't make a tool to remove it, people from the national spying agencies who created the rootkit would send them a bomb.
 
Back