Skip to main content

OSINT - LoJax Command and Control Domains Still Active

Low
Published: Wed Jan 16 2019 (01/16/2019, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: tool

Description

OSINT - LoJax Command and Control Domains Still Active

AI-Powered Analysis

AILast updated: 07/02/2025, 10:41:07 UTC

Technical Analysis

LoJax is a sophisticated rootkit malware known for its capability to persist on infected systems by implanting itself into the UEFI (Unified Extensible Firmware Interface) firmware, making it extremely difficult to detect and remove. The malware is associated with advanced persistent threat (APT) groups and has been used in targeted espionage campaigns. The specific threat highlighted here is that the command and control (C2) domains used by LoJax remain active as of the reported date, indicating ongoing potential for communication between infected hosts and attacker infrastructure. This persistence of C2 domains suggests that attackers may still be able to control or update the malware on compromised systems, potentially leading to data exfiltration, espionage, or further system compromise. Although the severity is reported as low, this may reflect the limited scope or current exploitation status rather than the inherent risk of the malware itself. The rootkit’s ability to survive system reinstallation and firmware updates makes it a particularly insidious threat, as traditional endpoint security measures may fail to detect or eradicate it. The lack of known exploits in the wild at the time of reporting may indicate limited active use, but the presence of active C2 infrastructure means the threat remains viable. The technical details indicate a moderate threat level and analysis confidence, with a moderate certainty of the OSINT information. The malware’s classification as a rootkit tool underlines its stealth and persistence capabilities.

Potential Impact

For European organizations, the impact of LoJax infections could be significant, especially for entities in critical infrastructure, government, defense, and high-value commercial sectors. The rootkit’s persistence in firmware could allow attackers to maintain long-term access to sensitive systems, enabling espionage, intellectual property theft, or sabotage. Given the stealthy nature of the malware, detection and remediation efforts would be complex and resource-intensive, potentially leading to prolonged exposure. The continued activity of C2 domains means attackers could still issue commands or updates, increasing the risk of data breaches or operational disruption. Organizations with legacy hardware or insufficient firmware security controls are particularly vulnerable. Additionally, the malware’s ability to survive OS reinstallations complicates incident response and recovery, potentially requiring hardware replacement or specialized firmware re-flashing procedures. The low reported severity may underestimate the potential damage in high-value targets, especially in sectors where confidentiality and integrity are paramount. The threat also poses reputational risks and could trigger regulatory scrutiny under European data protection laws if personal or sensitive data is compromised.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy focusing on firmware security and network monitoring. Specific recommendations include: 1) Conduct firmware integrity checks using vendor-provided tools or third-party solutions to detect unauthorized modifications. 2) Employ hardware-based security features such as Secure Boot and Trusted Platform Module (TPM) to prevent unauthorized firmware execution. 3) Maintain up-to-date firmware and BIOS versions from trusted sources to patch known vulnerabilities. 4) Monitor network traffic for communications with known LoJax C2 domains and block or isolate suspicious connections using advanced threat intelligence feeds. 5) Implement endpoint detection and response (EDR) solutions capable of detecting rootkit behaviors and anomalies at the firmware level. 6) Develop incident response plans that include procedures for firmware re-flashing or hardware replacement if infection is confirmed. 7) Educate IT and security personnel about the unique challenges of firmware-level malware and the importance of supply chain security. 8) Collaborate with national cybersecurity centers and share threat intelligence to stay informed about emerging LoJax activity and indicators of compromise. These measures go beyond generic advice by focusing on the firmware attack vector and active C2 infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
2
Original Timestamp
1547935413

Threat ID: 682acdbdbbaf20d303f0bf4f

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 10:41:07 AM

Last updated: 8/2/2025, 1:39:18 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats