News
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
Cybersecurity researchers have discovered “Bootkitty,” possibly the first UEFI bootkit specifically designed to target Linux systems. This marks a significant shift in the UEFI threat landscape, which ...
Bootkitty can theoretically boot the Linux kernel "seamlessly," even with Secure Boot activated, after which it injects itself into program processes upon system launch.
While not production-ready malware, ‘Bootkitty’ provides a proof of concept for exploiting Linux systems at boot-up — widening the UEFI attack path beyond the Windows ecosystem.
A recently surfaced Linux bootkit, which nests in the UEFI (Unified Extensible Firmware Interface) and is intended to bypass its security measures, is apparently a project by South Korean scientists.
ESET researchers uncover 'Bootkitty', a first-of-its-kind UEFI bootkit for Linux Bootkitty seems to be in early stages of development, but could pose a major risk Linux users warned to be on their ...
ESET researchers have uncovered the first UEFI bootkit designed specifically for Linux systems. The discovery of the bootkit – which has been named Bootkitty by its creators – signals a shift ...
"Bootkitty" is likely a proof-of-concept, but may portend working UEFI malware for Linux. See full article ...
Exploitation of this vulnerability can lead to the execution of untrusted code during system boot, enabling potential attackers to easily deploy malicious UEFI bootkits (such as Bootkitty or ...
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
Bootkitty doesn’t rewrite or tamper with the firmware, that’s high risk of bricking the box. It’s not “unkillable”, undetectable, or otherwise remarkable.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results