News

For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
The recently uncovered 'Bootkitty' UEFI bootkit, the first malware of its kind targeting Linux systems, exploits CVE-2023-40238, aka 'LogoFAIL,' to infect computers running on a vulnerable UEFI ...
Named 'Bootkitty,' the Linux malware is a proof-of-concept that works only on some Ubuntu versions and configurations rather than a fully fledged threat deployed in actual attacks.
ESET researchers uncover 'Bootkitty', a first-of-its-kind UEFI bootkit for Linux Bootkitty seems to be in early stages of development, but could pose a major risk Linux users warned to be on their ...
Tactic: ID: Name: Description: Resource Development: T1587.001: Develop Capabilities: Malware: Bootkitty is a brand-new UEFI bootkit developed by an unknown author.
While not production-ready malware, ‘Bootkitty’ provides a proof of concept for exploiting Linux systems at boot-up — widening the UEFI attack path beyond the Windows ecosystem.
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
While not yet complete, Bootkitty is described as the first UEFI bootkit for Linux that researchers have found. Bootkits like BlackLotus are a particular kind of malware designed to infect the ...
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
'Bootkitty' Malware Can Infect a Linux Machine's Boot Process. This appears to be the first UEFI bootkit that goes beyond Windows and targets Linux machines, according to ESET security researchers.