Bootkitty Unleashed: Hackers Target Linux with New UEFI Bootkit – A Scary Shift Beyond Windows!

Malware hunters at ESET have uncovered Bootkitty, a prototype UEFI bootkit that targets Ubuntu Linux, signaling hackers’ expansion beyond Windows. Though not an active threat yet, Bootkitty shows that UEFI bootkits are no longer just for Windows. Time for Linux fans to swap their penguins for guard dogs!

Pro Dashboard

Hot Take:

Hold onto your penguins, Linux users! The malware maestros are now playing in your backyard with Bootkitty, a UEFI bootkit prototype that’s decided to give Ubuntu a whirl. Somebody call a zookeeper, because the Bootkitty is on the prowl!

Key Points:

  • ESET discovered a UEFI bootkit prototype named Bootkitty targeting Ubuntu Linux configurations.
  • Bootkitty disables kernel signature verification, allowing unsigned kernel modules to load.
  • The bootkit is still in development, with unused functions and hardcoded offsets noted.
  • A related kernel module, BCDropper, shows rootkit-like behavior and may be linked to Bootkitty.
  • UEFI bootkits have traditionally targeted Windows systems but are now expanding to Linux.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?