Bootkitty: The Purr-sistently Pesky UEFI Bootkit Targeting Linux Systems!

Meet Bootkitty, the first UEFI bootkit designed to target Linux systems. This purr-sistent threat bypasses security measures, making it a ‘pawsible’ issue for some Ubuntu users. While not yet a major threat, it scratches the surface of Linux vulnerabilities, proving bootkits aren’t just a Windows purr-blem anymore.

Pro Dashboard

Hot Take:

Well, it looks like Linux has finally joined the UEFI bootkit party! Bootkitty has strutted onto the scene, proving that Windows isn’t the only one getting these unwanted guests. Who knew cats could be so sneaky? Let’s hope this kitty doesn’t have nine lives!

Key Points:

  • ESET discovered Bootkitty, the first UEFI bootkit targeting Linux systems.
  • Bootkitty bypasses UEFI Secure Boot by patching memory integrity verification functions.
  • The malware hooks UEFI authentication functions and patches GRUB boot loader functions.
  • An unsigned kernel module, BCDropper, was found alongside Bootkitty with similar traits.
  • Bootkitty is currently limited to specific systems and more of a proof of concept.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?