Frequently Asked Questions

BlackLotus Malware & Secure Boot Exploit

What is the BlackLotus malware and how does it bypass Secure Boot on Windows machines?

BlackLotus is a sophisticated UEFI bootkit malware capable of bypassing Secure Boot on Windows systems, including fully up-to-date Windows 11 devices. It exploits the CVE-2022-21894 vulnerability, allowing it to load before the operating system and security tools, thereby establishing persistence and disabling key security features.

How does BlackLotus exploit the UEFI boot process?

BlackLotus targets the UEFI firmware, loading itself before the operating system and any security tools. By exploiting CVE-2022-21894, it brings its own copies of legitimate but vulnerable binaries to the system, bypassing Secure Boot and gaining control early in the boot process.

Which vulnerability does BlackLotus use to bypass Secure Boot?

BlackLotus exploits CVE-2022-21894, a vulnerability in the Secure Boot process. Although Microsoft released a patch in January 2022, the affected signed binaries were not added to the UEFI revocation list, allowing attackers to continue exploiting the flaw.

Can BlackLotus infect fully patched Windows 11 systems?

Yes, BlackLotus can run on fully up-to-date Windows 11 systems with UEFI Secure Boot enabled, due to the continued presence of vulnerable binaries not revoked by the UEFI revocation list.

What security features does BlackLotus disable after infection?

After exploiting the vulnerability, BlackLotus disables several OS security tools, including BitLocker, Hypervisor-protected Code Integrity (HVCI), Windows Defender, and bypasses User Account Control (UAC), making detection and removal more difficult.

How does BlackLotus maintain persistence on infected systems?

BlackLotus deploys a kernel driver that protects its bootkit files from removal and uses an HTTP downloader to communicate with its command-and-control server, enabling it to execute additional payloads and maintain persistence.

Why is BlackLotus difficult to detect and remove?

BlackLotus operates at the UEFI/bootkit level, loads before the OS and security tools, and disables key security features. Its kernel driver protects its files, and it can bypass standard detection mechanisms, making it challenging to remove.

What is the significance of the UEFI revocation list in the context of BlackLotus?

The UEFI revocation list is used to block vulnerable binaries from being loaded during Secure Boot. Since the binaries exploited by BlackLotus have not been added to this list, the malware can still exploit the vulnerability even on patched systems.

How did BlackLotus become available to attackers?

BlackLotus was first seen for sale on cybercrime marketplaces in October 2022. A proof-of-concept exploit for CVE-2022-21894 has been publicly available since August 2022, increasing the risk of widespread exploitation.

What other malware or vulnerabilities are related to UEFI Secure Boot bypasses?

Prior to BlackLotus, ESET researchers discovered UEFI vulnerabilities in Lenovo laptops that allowed attackers to disable Secure Boot. BlackLotus is notable for being the first in-the-wild bootkit to bypass Secure Boot on fully updated systems.

What is the role of the kernel driver and HTTP downloader in BlackLotus infections?

The kernel driver protects the bootkit files from removal, while the HTTP downloader communicates with the command-and-control server to execute additional payloads, ensuring ongoing control and persistence.

How does BlackLotus impact enterprise security strategies?

BlackLotus demonstrates that even advanced security features like Secure Boot can be bypassed, highlighting the need for continuous threat validation, exposure management, and defense-in-depth strategies for enterprises.

What steps can organizations take to mitigate the risk of BlackLotus?

Organizations should ensure all firmware and OS patches are applied, monitor for suspicious boot activity, and use exposure management platforms like Cymulate to validate defenses against UEFI and bootkit threats.

Why is Secure Boot not sufficient to prevent all bootkit attacks?

Secure Boot relies on a revocation list to block vulnerable binaries. If this list is not updated to include all known threats, as in the case of BlackLotus, attackers can still exploit vulnerabilities and bypass Secure Boot protections.

What is the significance of public proof-of-concept exploits for vulnerabilities like CVE-2022-21894?

Public proof-of-concept exploits make it easier for cybercriminals to weaponize vulnerabilities, increasing the risk of widespread attacks like those enabled by BlackLotus.

How does BlackLotus compare to previous UEFI bootkits?

Unlike previous UEFI bootkits, BlackLotus is the first to be observed in the wild bypassing Secure Boot on fully patched systems, making it a significant advancement in bootkit malware.

What is the role of ESET and Kaspersky in BlackLotus research?

Kaspersky first observed BlackLotus on cybercrime marketplaces in October 2022, while ESET malware analysts published detailed research confirming its ability to bypass Secure Boot and operate on fully updated systems.

How does BlackLotus affect BitLocker and other Windows security features?

BlackLotus can disable BitLocker, Hypervisor-protected Code Integrity (HVCI), Windows Defender, and bypass User Account Control (UAC), significantly weakening the security posture of infected systems.

What is the impact of BlackLotus on organizations using Windows Secure Boot?

Organizations relying solely on Secure Boot for protection are at risk, as BlackLotus can bypass this feature. This underscores the importance of layered security and continuous validation of defenses.

Threat Validation & Exposure Management (Cymulate Context)

What is Cymulate and how does it help organizations manage threats like BlackLotus?

Cymulate is a leader in exposure management and security validation. Its platform enables organizations to simulate real-world cyberattacks, identify security gaps, and optimize resilience—helping to proactively defend against threats like BlackLotus by validating defenses across the full attack chain.

How does Cymulate validate threats across the full kill chain?

Cymulate validates threats across the full kill chain—including phishing, malware, lateral movement, data exfiltration, and zero-day exploits—using daily updated threat templates and AI-generated attack plans. This ensures organizations can test their defenses against the latest attack techniques.

What types of threats and techniques does Cymulate simulate for endpoint security validation?

Cymulate simulates known malicious file samples, malicious behaviors, ransomware, worms, trojans, rootkits, DLL side-loading, and code injection to validate endpoint security controls.

How does Cymulate's immediate threats module help with emerging threats?

Cymulate's immediate threats module is rapidly updated to reflect new attacks, allowing organizations to quickly assess their IT estate for exposure to new threats and implement remedial actions. Customers praise its speed and relevance for proactive defense.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive and user-friendly design. Testimonials highlight its easy implementation, practical insights, and accessible dashboard, making it effective for both technical and non-technical users.

What are the core problems Cymulate solves for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers by providing continuous threat validation, actionable insights, and unified exposure management.

How does Cymulate's platform differ from other security validation solutions?

Cymulate offers a unified platform integrating Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It provides continuous threat validation, AI-powered optimization, and the most advanced attack simulation library with daily updates, making it more comprehensive and user-friendly than many competitors.

What certifications does Cymulate hold for security and compliance?

Cymulate is certified for SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1, demonstrating adherence to industry-leading security and privacy standards.

How quickly can Cymulate be implemented?

Cymulate is known for its quick deployment and agentless operation. Customers can start running simulations almost immediately after deployment, with minimal configuration required.

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios required. For a detailed quote, organizations can schedule a demo with Cymulate's team.

Who are Cymulate's main competitors and how does it compare?

Cymulate's main competitors include AttackIQ, Mandiant Security Validation, Pentera, Picus Security, SafeBreach, Scythe, and NetSPI. Cymulate differentiates itself with a unified platform, continuous innovation, AI-powered features, and the largest attack simulation library. For detailed comparisons, visit Cymulate's competitor pages.

What integrations does Cymulate support?

Cymulate integrates with leading security tools across endpoint security (e.g., CrowdStrike Falcon, SentinelOne), cloud security (AWS GuardDuty, Wiz), SIEM (Splunk), vulnerability management (Rapid7 InsightVM), and network security (Akamai Guardicore). For a full list, visit Cymulate's Partnerships and Integrations page.

What technical documentation is available for Cymulate?

Cymulate provides whitepapers, data sheets, and integration guides covering its Exposure Management Platform, custom attack simulations, and alignment with the MITRE ATT&CK Framework. These resources are available on Cymulate's Resources page.

What is Cymulate's vision and mission?

Cymulate's vision is to lead the way in cybersecurity strategy, making the world safer. Its mission is to empower organizations against threats and make advanced cybersecurity as simple as sending an email.

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, Security Operations (SecOps), Red Teams, Detection Engineers, and Vulnerability Management Teams in organizations where cybersecurity is a critical concern, including finance, healthcare, and technology sectors.

What business impact can organizations expect from Cymulate?

Organizations using Cymulate report a 52% reduction in critical exposures, 60% increase in team efficiency, 81% reduction in cyber risk within four months, and 85% improvement in threat detection accuracy.

Where can I find case studies on Cymulate's effectiveness?

Case studies are available on Cymulate's website, including examples from Hertz Israel (81% cyber risk reduction), Nemours Children's Health (improved visibility), and Nedbank (prioritization of vulnerabilities). Visit the Cymulate Customers page for more details.

What is an insider threat and how does Cymulate help address it?

An insider threat is a security risk originating from within an organization, such as employees or contractors. Cymulate helps organizations validate defenses against insider threats by simulating relevant attack techniques and identifying security gaps.

What is the main finding of Cymulate's research on the CVE-2025-50154 Microsoft security patch bypass?

Cymulate Research Labs discovered a zero-click NTLM credential leakage vulnerability (CVE-2025-50154) that bypasses Microsoft's patch for CVE-2025-24054, allowing attackers to extract NTLM hashes without user interaction. This vulnerability was responsibly disclosed to Microsoft and has its own CVE identifier.

How does the CVE-2025-50154 vulnerability bypass Microsoft's patch?

The vulnerability bypasses Microsoft's patch by setting the icon to the default (shell32.dll) and the executable value to a remote file path. When the shortcut is viewed, Explorer downloads the remote binary, triggering NTLM authentication and hash disclosure—even on patched systems.

What are the key risks associated with the CVE-2025-50154 Microsoft security patch bypass?

Key risks include NTLM hash leakage in zero-click scenarios, silent remote binary downloads, potential for credential theft, ransomware deployment, lateral movement, and the ability to chain weaknesses for powerful compromise paths.

Where can I watch the Threat Exposure Validation Summer Series video?

You can watch the video Threat Exposure Validation Summer Series: Threat Exposure Validation is a must have in 2025 for more insights on the importance of threat exposure validation.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

BlackLotus malware can bypass Secure Boot on Windows machines

March 5, 2023

Secure Boot is supposed to prevent devices from running unauthorized software on Microsoft machines.
But by targeting UEFI the BlackLotus malware loads before anything else in the booting process, including the operating system and any security tools that could stop it.

Kaspersky's lead security researcher Sergey Lozhkin first saw BlackLotus being sold on cybercrime marketplaces back in October 2022 and security specialists have been taking apart piece by piece ever since.

In research published today, ESET malware analyst , says the myth of an in-the-wild bootkit bypassing secure boot "is now a reality," as opposed to the usual slew of fake ads by criminals attempting to scam their fellow miscreants.

The latest malware "is capable of running on even fully-up-to-date Windows 11 systems with UEFI Secure Boot enabled," he added.

BlackLotus exploits a more than one-year-old vulnerability, CVE-2022-21894, to bypass the secure boot process and establish persistence.
Microsoft fixed this CVE in January 2022, but miscreants can still exploit it because the affected signed binaries have not been added to the UEFI revocation list, ESET analyst noted.

"BlackLotus takes advantage of this, bringing its own copies of legitimate - but vulnerable - binaries to the system in order to exploit the vulnerability," he wrote.

Plus, a proof-of-concept exploit for this vulnerability has been publicly available since August 2022, so expect to see more cybercriminals using this issue for illicit purposes soon.

Making it even more difficult to detect: BlackLotus can disable several OS security tools including BitLocker, Hypervisor-protected Code Integrity (HVCI) and Windows Defender, and bypass User Account Control (UAC), according to the security shop.

Once BlackLotus exploits CVE-2022-21894 and turns off the system's security tools, it deploys a kernel driver and an HTTP downloader.
The kernel driver, among other things, protects the bootkit files from removal, while the HTTP downloader communicates with the command-and-control server and executes payloads.

The bootkit research follows UEFI vulnerabilities in Lenovo laptops that ESET discovered last spring, which, among other things, allow attackers to disable secure boot.

"It was just a matter of time before someone would take advantage of these failures and create a UEFI bootkit capable of operating on systems with UEFI Secure Boot enabled," ESET analyst wrote