Skip to main content
Published Mar 03, 2023 | Updated Dec 21, 2023

Trojan:Win32/BlackLotus

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

A BlackLotus compromise chain begins with an attacker who already has administrative or physical access to a target device to launch the installer and deploy files to the ESP, disable HVCI, bypass BitLocker (when required), and restart the device.

Follow us