Bootkitty: The Purr-sistently Pesky UEFI Bootkit Targeting Linux Systems!
Meet Bootkitty, the first UEFI bootkit designed to target Linux systems. This purr-sistent threat bypasses security measures, making it a ‘pawsible’ issue for some Ubuntu users. While not yet a major threat, it scratches the surface of Linux vulnerabilities, proving bootkits aren’t just a Windows purr-blem anymore.

Hot Take:
Well, it looks like Linux has finally joined the UEFI bootkit party! Bootkitty has strutted onto the scene, proving that Windows isn’t the only one getting these unwanted guests. Who knew cats could be so sneaky? Let’s hope this kitty doesn’t have nine lives!
Key Points:
- ESET discovered Bootkitty, the first UEFI bootkit targeting Linux systems.
- Bootkitty bypasses UEFI Secure Boot by patching memory integrity verification functions.
- The malware hooks UEFI authentication functions and patches GRUB boot loader functions.
- An unsigned kernel module, BCDropper, was found alongside Bootkitty with similar traits.
- Bootkitty is currently limited to specific systems and more of a proof of concept.
Already a member? Log in here