Cybersecurity researchers have discovered “Bootkitty,” possibly the first UEFI bootkit specifically designed to target Linux systems. This marks a significant shift in the UEFI threat landscape, which ...
UPDATE: November 28, 3:20 PM California time. The headline of this post has been changed. This update is adding the following further details: this threat is not a UEFI firmware implant or rootkit, it ...
In a nutshell: A serendipitous discovery led to a new warning of threats against Linux. The open-source platform is becoming an increasingly tasty target for cyber-criminals, and malware writers are ...
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
While not production-ready malware, ‘Bootkitty’ provides a proof of concept for exploiting Linux systems at boot-up — widening the UEFI attack path beyond the Windows ecosystem. Bootkitty, a recently ...
ESET researchers have uncovered the first UEFI bootkit designed specifically for Linux systems. The discovery of the bootkit – which has been named Bootkitty by its creators – signals a shift on the ...
Unearthed sample likely works against Linux devices from Acer, HP, Fujitsu, and Lenovo. Machines vulnerable to the exploit include some models sold by Acer, HP, Fujitsu, and Lenovo when they ship with ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results