News

LogoFAIL, image parsing vulnerabilities on Linux and Windows, are being actively abused Researchers are saying crooks are installing Bootkitty, the first-ever Linux UEFI bootkit Bootkitty works on ...
The recently uncovered 'Bootkitty' UEFI bootkit, the first malware of its kind targeting Linux systems, exploits CVE-2023-40238, aka 'LogoFAIL,' to infect computers running on a vulnerable UEFI ...
Be prepared. Still, Bootkitty suggests threat actors may be actively developing a Linux version of the same sort of bootkit that previously was found only targeting Windows machines.
Bootkitty is designed to boot the Linux kernel seamlessly, whether UEFI Secure Boot is enabled or not, as it patches, in memory, the necessary functions responsible for integrity verification ...
While not yet complete, Bootkitty is described as the first UEFI bootkit for Linux that researchers have found. Bootkits like BlackLotus are a particular kind of malware designed to infect the ...
The ultimate objective of the exploit, which Binarly disclosed Friday, is to install Bootkitty, a bootkit for Linux that was found and reported on Wednesday by researchers from security firm ESET.
Cybersecurity researchers have discovered “Bootkitty,” possibly the first UEFI bootkit specifically designed to target Linux systems. This marks a significant shift in the UEFI threat landscape, which ...
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...
LogoFAIL, image parsing vulnerabilities on Linux and Windows, are being actively abused Researchers are saying crooks are installing Bootkitty, the first-ever Linux UEFI bootkit Bootkitty works on ...
For example, Bootkitty can’t run on a Linux machine with the UEFI Secure Boot enabled by default since the malware uses a self-signed software certificate from its creator rather than a trusted ...