April 11, 2023, 5 p.m. | Microsoft Security Threat Intelligence - Editor

Microsoft Security Blog www.microsoft.com

This guide provides steps that organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2022-21894 via a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus.


The post Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign appeared first on Microsoft Security Blog.

attacks blacklotus blog bootkit called campaign compromised cve cve-2022-21894 cybersecurity exploiting firmware guidance guide interface microsoft microsoft security organizations security security blog threat threat actors uefi

More from www.microsoft.com / Microsoft Security Blog

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India