UEFI Cyber Security Vulnerability
On Wednesday, March 1st, 2023, researchers announced the discovery of the first real-world malware that can hijack a computer’s boot process even when advanced protections, such as Secure Boot, are enabled and running on fully updated versions of Windows. Dubbed BlackLotus, this malware is a UEFI bootkit that targets the low-level and complex firmware responsible for booting up modern computers, known as the Unified Extensible Firmware Interface (UEFI). Because the UEFI is the first thing to run when a computer is turned on, it influences all other software that follows and is, therefore, the perfect place to launch malware. UEFI bootkits, including BlackLotus, disable OS security mechanisms and ensure that a computer remains infected with stealthy malware even after the operating system is reinstalled or a hard drive is replaced.
However, there are two significant hurdles that stand in the way of UEFI attacks. First, threat actors must gain administrator system rights by exploiting vulnerabilities in the OS or apps or tricking a user into installing trojanised software. Second, UEFI Secure Boot, an industry-wide standard that creates a chain of trust to prevent attackers from replacing the intended bootup firmware with malicious firmware, uses cryptographic signatures to ensure that each piece of software used during startup is trusted by a computer’s manufacturer. While Secure Boot vulnerabilities have been found in the past, there has been no indication that threat actors have ever been able to bypass the protection in the 12 years it has been in existence, until now.
To bypass Secure Boot, BlackLotus exploits CVE-2022-21894, a vulnerability in all supported versions of Windows that Microsoft patched in January 2022. The logic flaw can be exploited to remove Secure Boot functions from the boot sequence during startup, and attackers can also use the flaw to obtain keys for BitLocker, a Windows feature for encrypting hard drives. Despite Microsoft releasing new patched software, the vulnerable signed binaries have yet to be added to the UEFI revocation list that flags boot files that should no longer be trusted. If those signed binaries are revoked, millions of devices will no longer work, so fully updated devices remain vulnerable because attackers can simply replace patched software with the older, vulnerable software.
As BlackLotus first requires that threat actors gain administrator rights through existing vulnerabilities or attack methods, this latest vulnerability can already be stopped by using One2Call’s Endpoint Detection and Response Cyber Security Service to monitor for vulnerabilities, unusual activities and more. Stopping attacks before they can happen.
Latest News Stories
Greece’s Education System Hit By ‘Largest Ever’ Cyber Attack
Greece's Education Ministry has been subjected to an unprecedented cyber attack, described as the most extensive in the country's history. The malicious attempt aimed to disrupt the centralised high school examination platform known as the “Subject Bank”. The Subject...
Celebrating our Local Football Teams
In a remarkable turn of events that has sent waves of jubilation throughout the Sheffield region, both Sheffield Wednesday and Sheffield United football clubs have secured their respective promotions in the 2022-2023 season. This is a tremendous achievement for both...
Rochester Schools Still Suffering 1 Month After Cyber Attack
Rochester Public Schools, based in Minnesota, was hit by a significant ransomware attack on 6th April 2023, disrupting its operations and affecting thousands of students, teachers, and staff members. The attack was first detected at 4:30 a.m. by a member of their IT...
Our Customers
Testimonials
Mark, Modern Creatives
Local, extremely helpful, prompt. Quick to react when there have been issues (not caused by One2call). Have recommended in the past to clients.
Yolande Quickfall, Saxton Mee
One2Call are certainly liked by us as they are always keen to help and resolve any problems that we may have and with a quick response.
John Griffiths, Acclaimed Family Law
Personal touch ,easy to deal with ,thank you.