Monday, April 14, 2025
HomeCyber Security News"Bootkitty" - A First Ever UEFI Bootkit Attack Linux Systems

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.

This discovery, named ‘Bootkitty’, marks a new chapter in UEFI threats, which have predominantly targeted Windows systems until now.

The UEFI (Unified Extensible Firmware Interface) threat landscape has seen considerable evolution over the past decade.

- Advertisement - Google News

Evolution of UEFI Threats

Initially, in 2012, the first proof-of-concept UEFI bootkit was presented by Andrea Allievi. Since then, several proof-of-concept bootkits such as EfiGuard, Boot Backdoor, and UEFI-bootkit have emerged.

However, it wasn’t until 2021 that the first real-world UEFI bootkits, ESPecter and FinSpy, were discovered. In 2023, the BlackLotus bootkit further raised the stakes by bypassing UEFI Secure Boot on up-to-date systems.

Bootkitty represents a new class of UEFI threats by specifically targeting Linux systems, starting with certain versions of Ubuntu.

UEFI Bootkit
Bootkitty execution overview

Unlike its predecessors, which exclusively targeted Windows, Bootkitty disables the Linux kernel’s signature verification feature.

The bootkit employs a self-signed certificate, making it incapable of running on systems with UEFI Secure Boot enabled unless attacker certificates are installed.

Technical Insights

Bootkitty’s primary objective is to patch the Linux kernel in memory, circumventing integrity verifications before the GRUB bootloader is executed.

This method limits its functionality to specific configurations due to its use of hardcoded byte patterns for patching.

ESET Detailed analysis reveals that Bootkitty attempts to preload ELF binaries via the Linux init process.

Additionally, a possibly related unsigned kernel module, BCDropper, was discovered.

This module is suspected to have been developed by the same authors and is responsible for loading another unknown kernel module.

While Bootkitty currently appears to be more of a proof-of-concept rather than a fully operational threat, its existence underscores the potential expansion of UEFI bootkits to Linux systems.

Bootkitty modifies kernel version and Linux banner strings, which can be detected using the uname -v and dmesg commands.

System administrators are advised to ensure that UEFI Secure Boot is enabled and that system firmware and operating systems are up-to-date.

A simple corrective action involves restoring the legitimate GRUB bootloader file to its original location to mitigate Bootkitty’s effects.

The emergence of Bootkitty signals a significant shift in UEFI bootkit threats, highlighting the need for vigilance in securing Linux systems against potential future threats.

This development serves as a critical reminder of the evolving nature of cybersecurity threats and the importance of robust security measures.

IoCs

A comprehensive list of indicators of compromise (IoCs) and samples can be found in our GitHub repository.

Files

SHA-1FilenameDetectionDescription
35ADF3AED60440DA7B80F3C452047079E54364C1bootkit.efiEFI/Agent.ABootkitty UEFI bootkit.
BDDF2A7B3152942D3A829E63C03C7427F038B86Ddropper.koLinux/Rootkit.Agent.FMBCDropper.
E8AF4ED17F293665136E17612D856FA62F96702DobserverLinux/Rootkit.Agent.FMBCObserver.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...