Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Mar 03, 2023 | Updated Dec 22, 2023

Trojan:Win32/BlackLotus!MSR

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

A BlackLotus compromise chain begins with an attacker who already has administrative or physical access to a target device to launch the installer and deploy files to the ESP, disable HVCI, bypass BitLocker (when required), and restart the device.

Follow us