Bonum Certa Men Certa

UEFI 'Security' is Totally Hopeless, Even a Paradox

BlackLotus UEFI Bootkit Source Code Leaked on GitHub
Like 'pwning' Microsoft on a Microsoft/NSA platform



Summary: The pseudo-security industry (bug doors, imperialism/national security in 'security' clothing) is losing the argument; grown-ups have meanwhile classified UEFI 'secure' boot as a laughing stock and its proponents as Microsoft trolls

THE people who promote fake security just 'happen' to be the loudest and most aggressive Internet (or IRC) trolls, constantly looking to defame, threaten, blackmail, and maybe even dox both my wife and I.



They keep losing the argument, they even half-admit that (in their blogs), but somehow it's us who are the problem?

It has been nearly a year since we last wrote about UEFI 'secure' boot, i.e. outsourcing to Microsoft portrayed as some kind of Buffy-on-steroids of security. But it's back in the news [1] because of another black eye. As a reminder, there's no real solution to this [2-4]. Just reject fake security. Reject Microsoft and its Munchkins [1, 2, 3].

Related/contextual items from the news:


  1. BlackLotus UEFI Bootkit Source Code Leaked on GitHub

    The source code for the BlackLotus UEFI bootkit has been leaked on GitHub and an expert has issued a warning over the risks.



  2. NSA: BlackLotus BootKit Patching Won't Prevent Compromise

    BlackLotus burst on the scene last fall when it was spotted for sale on the Dark Web for $5,000. It has the dubious distinction of being the first in-the-wild malware to successfully bypass to Microsoft's Unified Extensible Firmware Interface (UEFI) Secure Boot protections.

    UEFI is the firmware that's responsible for the booting-up routine, so it loads before the operating system kernel and any other software. BlackLotus — a software, not a firmware threat, it should be noted — takes advantage of two vulnerabilities in the UEFI Secure Boot function to insert itself into the earliest phase of the software boot process initiated by UEFI: CVE-2022-21894, aka Baton Drop, CVSS score 4.4; and CVE-2023-24932, CVSS score 6.7. These were patched by Microsoft in January 2022 and May 2023 respectively.

    But the country's top technology intelligence division warned that applying the available Windows 10 and Windows 11 patches is only a "a good first step."



  3. Microsoft’s bootkit patches offer ‘false sense of security’ against BlackLotus threat, NSA says

    BlackLotus targets Windows boot by exploiting a flaw in older boot loaders, or boot managers, to set off a chain of malicious actions that compromise endpoint security. This is achieved by exploiting the Baton Drop vulnerability to strip the Secure Boot policy and prevent its enforcement.

    BlackLotus shares some characteristics with Boot Hole, a vulnerability discovered in 2020. Unlike Boot Hole, however, BlackLotus targets vulnerable boot loaders that have not been added to the Secure Boot Deny List Database (DBX) revocation list.



  4. To kill BlackLotus malware, patching is a good start, but...

    Then, in research published in March, ESET malware analyst Martin Smolár confirmed the myth of an in-the-wild bootkit bypassing Secure Boot "is now a reality," as opposed to hypothetical threats raised by some experts and the usual slew of fake bootkits criminals attempted to trick fellow miscreants into buying.

    No Linux-targeting variant of the malware has been observed; BlackLotus strictly nobbles Microsoft Windows machines.



Recent Techrights' Posts

Facebook's Debt Leaps to Over 51 Billion Dollars
A lot of this is a bubble, aside from the bubble the media irresponsibly dubs "AI"
3 Days Ago Over at Tux Machines...
GNU/Linux news
Most of This Month Will Deal With EPO Scandals
A timeline of sorts
Links 01/11/2025: Microsoft Distributes Malware Again, Radio Free Asia Shut Down by Dictator
Links for the day
 
Linux.com is Becoming Microsoft
They took a once-reputable site with a vast audience and turned it into a pile of trash
Microsoft Lunduke: People Pointing Out I'm a Bigot is a Badge of Honour
It's almost as if he openly admits being a troll and is proud of it
Oracle's Debt Continues Rising to All-Time Highs, The "Slop Bubble" is a Smokescreen for Larry Ellison
wishful-thinking bubble waiting to implode completely
News on the Web is Becoming Rare, Shallow, and Difficult to Find
To efficiently and rapidly find original and important news without underlying comprehension/understanding of the news (and its context) is a hard task
Slopwatch: Linux Journal, Serial Slopper, WebProNews, and More
getting back into the habit
The Cocaine Patent Office - Part III: European Patent Office Officials Cannot Claim False Identification
Corroborating with other sources is always desirable if possible. We shall do so later in this series.
Still Catching Up, Daily Links a Top Priority
Readers who have additional information about the EPO can send it along to us
Links 01/11/2025: "Americans Are Defaulting on Car Loans at an Alarming Rate" While Many Left to Starve (SNAP)
Links for the day
Gemini Links 01/11/2025: FIFO and Gemini Age Survey
Links for the day
Why Does German Media Protect the EPO From Accountability for Cocaine?
Can we trust such media to properly inform the public?
Links 01/11/2025: Microsoft Azure Goes Offline Again
Links for the day
November is Here, Anniversary Party This Coming Friday
Expect this site to return to its normal publication pace either by tomorrow or Monday
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, October 31, 2025
IRC logs for Friday, October 31, 2025
Gemini Links 01/11/2025: Synergetic Disinformation and Software Maintenance
Links for the day
IRC Proceedings: Thursday, October 30, 2025
IRC logs for Thursday, October 30, 2025
IRC Proceedings: Wednesday, October 29, 2025
IRC logs for Wednesday, October 29, 2025