Tag

Logofail

All articles tagged with #logofail

Bootkitty: First UEFI Bootkit Malware Targets Linux Systems

Originally Published 1 year ago — by Ars Technica

Featured image for Bootkitty: First UEFI Bootkit Malware Targets Linux Systems
Source: Ars Technica

A new exploit, dubbed LogoFAIL, allows attackers to bypass Secure Boot protections on certain Linux machines by injecting malicious code into a bitmap image during the boot process. This code installs a cryptographic key that tricks the UEFI into treating a backdoored GRUB and Linux kernel as trusted, effectively creating a bootkit. The exploit targets devices with Insyde UEFI firmware, affecting models from Acer, HP, Fujitsu, and Lenovo. Insyde has released a patch, but unpatched devices remain vulnerable.

Widespread Vulnerability: LogoFAIL Exploit Threatens Windows and Linux Devices

Originally Published 2 years ago — by Slashdot

Featured image for Widespread Vulnerability: LogoFAIL Exploit Threatens Windows and Linux Devices
Source: Slashdot

Researchers have discovered a series of vulnerabilities, known as LogoFAIL, in the Unified Extensible Firmware Interfaces (UEFIs) of Windows and Linux devices. These vulnerabilities allow for the undetectable installation of malicious code during the boot process by replacing legitimate logo images with specially crafted ones. The vulnerabilities affect UEFI suppliers, device manufacturers, and CPU makers. Once arbitrary code execution is achieved, attackers have full control over the device's memory and disk, including the operating system. The best defense against LogoFAIL attacks is to install UEFI security updates and configure multiple layers of defenses, such as Secure Boot and Intel Boot Guard.

LogoFAIL: New Firmware Attack Exploits UEFI Vulnerabilities on Windows and Linux Devices

Originally Published 2 years ago — by Ars Technica

Featured image for LogoFAIL: New Firmware Attack Exploits UEFI Vulnerabilities on Windows and Linux Devices
Source: Ars Technica

A new firmware attack called LogoFAIL has been discovered, affecting hundreds of Windows and Linux computer models from various hardware makers. The attack exploits vulnerabilities in Unified Extensible Firmware Interfaces (UEFIs) responsible for booting devices, allowing for the execution of malicious firmware early in the boot-up sequence. LogoFAIL can be remotely executed and bypasses traditional endpoint security products, including Secure Boot. The vulnerabilities have been disclosed by multiple companies, and security patches are being released. The attack gives threat actors control over the memory and disk of the target device, compromising platform security.