Bootkitty: First UEFI Bootkit Malware Targets Linux Systems

1 min read
Source: Ars Technica
Bootkitty: First UEFI Bootkit Malware Targets Linux Systems
Photo: Ars Technica
TL;DR Summary

A new exploit, dubbed LogoFAIL, allows attackers to bypass Secure Boot protections on certain Linux machines by injecting malicious code into a bitmap image during the boot process. This code installs a cryptographic key that tricks the UEFI into treating a backdoored GRUB and Linux kernel as trusted, effectively creating a bootkit. The exploit targets devices with Insyde UEFI firmware, affecting models from Acer, HP, Fujitsu, and Lenovo. Insyde has released a patch, but unpatched devices remain vulnerable.

Share this article

Reading Insights

Total Reads

0

Unique Readers

0

Time Saved

2 min

vs 3 min read

Condensed

83%

44978 words

Want the full story? Read the original article

Read on Ars Technica