Bootkitty Unleashed: Hackers Target Linux with New UEFI Bootkit – A Scary Shift Beyond Windows!
Malware hunters at ESET have uncovered Bootkitty, a prototype UEFI bootkit that targets Ubuntu Linux, signaling hackers’ expansion beyond Windows. Though not an active threat yet, Bootkitty shows that UEFI bootkits are no longer just for Windows. Time for Linux fans to swap their penguins for guard dogs!

Hot Take:
Hold onto your penguins, Linux users! The malware maestros are now playing in your backyard with Bootkitty, a UEFI bootkit prototype that’s decided to give Ubuntu a whirl. Somebody call a zookeeper, because the Bootkitty is on the prowl!
Key Points:
- ESET discovered a UEFI bootkit prototype named Bootkitty targeting Ubuntu Linux configurations.
- Bootkitty disables kernel signature verification, allowing unsigned kernel modules to load.
- The bootkit is still in development, with unused functions and hardcoded offsets noted.
- A related kernel module, BCDropper, shows rootkit-like behavior and may be linked to Bootkitty.
- UEFI bootkits have traditionally targeted Windows systems but are now expanding to Linux.
Already a member? Log in here