Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Mar 04, 2023 | Updated Feb 01, 2024

Trojan:Win64/BlackLotus!MSR

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

A BlackLotus compromise chain begins with an attacker who already has administrative or physical access to a target device to launch the installer and deploy files to the ESP, disable HVCI, bypass BitLocker (when required), and restart the device.

Follow us