Revisiting LoJax: The First UEFI Rootkit Found in the Wild
Revisiting LoJax: The First UEFI Rootkit Found in the Wild Lessons from Firmware-Level Attacks on Modern Platforms “To understand the immeasurable, the mind must be extraordinarily quiet, still.” — Jiddu Krishnamurti Seeker( 李标明 ) · @clibm079 China · Independent Malware Analyst & Researcher From 2025.12.3 to 2025.12.17 Prologue: Ever climbing, with poetry to mark the rhythm Last time, at the end of the article titled “Revisiting SubVirt & Blue Pill: From Attacker Proof-of-Concepts to Defensive Foundations,” I had noticed the first UEFI firmware rootkit, LoJax, in the wild in 2018 . Earlier than that time, I consciously collected some relevant malware samples, but I found it’s very hard for me to directly do analysis. And later in the process of malware research, I already understood the basic kernel, ATA IOCTL, IRPs, loaders, and VM-based knowledge...