Tag

Bootkit

All articles tagged with #bootkit

HybridPetya Ransomware Bypasses UEFI Secure Boot to Encrypt Hard Drives

Originally Published 4 months ago — by theregister.com

Featured image for HybridPetya Ransomware Bypasses UEFI Secure Boot to Encrypt Hard Drives
Source: theregister.com

HybridPetya is a proof-of-concept ransomware-bootkit that exploits a patched UEFI Secure Boot vulnerability to hijack Windows systems before OS load, highlighting that Secure Boot bypasses are real and evolving, though it has not been seen in the wild yet.

HybridPetya Ransomware Bypasses UEFI Secure Boot with CVE-2024-7344 Exploit

Originally Published 4 months ago — by The Hacker News

Featured image for HybridPetya Ransomware Bypasses UEFI Secure Boot with CVE-2024-7344 Exploit
Source: The Hacker News

Cybersecurity researchers have discovered HybridPetya, a new ransomware that can bypass UEFI Secure Boot using the patched CVE-2024-7344 vulnerability, by installing malicious EFI applications and encrypting the Master File Table, with capabilities for encryption, ransom demands, and potential decryption, although it has not been observed in active use.

HybridPetya Ransomware Bypasses UEFI Secure Boot to Encrypt Hard Drives

Originally Published 4 months ago — by WeLiveSecurity

Featured image for HybridPetya Ransomware Bypasses UEFI Secure Boot to Encrypt Hard Drives
Source: WeLiveSecurity

ESET Research discovered HybridPetya, a Petya/NotPetya copycat with advanced capabilities including UEFI Secure Boot bypass via CVE‑2024‑7344, and the ability to compromise modern UEFI systems by installing malicious EFI applications, although it is not actively spreading in the wild yet.

Gigabyte Motherboards Vulnerable to Critical UEFI Security Flaws

Originally Published 6 months ago — by BleepingComputer

Featured image for Gigabyte Motherboards Vulnerable to Critical UEFI Security Flaws
Source: BleepingComputer

Dozens of Gigabyte motherboards are vulnerable to UEFI firmware security flaws that can allow stealthy bootkit malware to bypass Secure Boot and persist through reinstallation, with over 100 models affected and no current fixes for many due to end-of-life status, posing significant risks especially in critical environments.

"Bootkitty": First UEFI Bootkit Threatens Linux Systems

Originally Published 1 year ago — by Ars Technica

Featured image for "Bootkitty": First UEFI Bootkit Threatens Linux Systems
Source: Ars Technica

Security researchers at ESET have discovered Bootkitty, the first known UEFI bootkit targeting Linux systems, uploaded to VirusTotal. While currently limited to Ubuntu and lacking full functionality, Bootkitty represents a potential shift in UEFI threats, previously exclusive to Windows. This development underscores the need for vigilance against future Linux-targeted bootkits, which can persist undetected by infecting firmware before the operating system loads.

Bootkitty: Unveiling the First UEFI Bootkit Threat to Linux Systems

Originally Published 1 year ago — by The Hacker News

Featured image for Bootkitty: Unveiling the First UEFI Bootkit Threat to Linux Systems
Source: The Hacker News

Researchers have discovered "Bootkitty," the first UEFI bootkit targeting Linux systems, developed by a group named BlackCat. Although currently a proof-of-concept with no real-world attacks reported, Bootkitty disables kernel signature verification and preloads unknown binaries during system startup. It bypasses UEFI Secure Boot by hooking authentication protocols and patching GRUB boot loader functions. The bootkit also includes a kernel module with rootkit capabilities, but no link to the ALPHV/BlackCat ransomware group has been found. This development highlights the expanding threat landscape beyond Windows systems.

Bootkitty: Unveiling the First UEFI Bootkit Threat to Linux

Originally Published 1 year ago — by We Live Security

Featured image for Bootkitty: Unveiling the First UEFI Bootkit Threat to Linux
Source: We Live Security

ESET researchers have discovered Bootkitty, the first UEFI bootkit targeting Linux systems, specifically some Ubuntu versions. This bootkit, likely a proof of concept, aims to disable kernel signature verification and preload unknown ELF binaries during the Linux init process. Bootkitty is signed with a self-signed certificate, making it ineffective on systems with UEFI Secure Boot unless the attacker's certificates are installed. The discovery highlights the expanding threat landscape of UEFI bootkits beyond Windows systems. Researchers emphasize the importance of keeping UEFI Secure Boot enabled and systems updated to mitigate such threats.