×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Information Tecnology
  • ESET discovers the first UEFI bootkit for Linux

Customer Press Room

ESET discovers the first UEFI bootkit for Linux

by Grandangolo Communications / Tuesday, 10 December 2024 / Published in Information Tecnology

Bootkitty contains numerous elements that suggest it is a proof of concept and not a concrete threat. However, it certifies that bootkits are no longer limited to Windows systems

Researchers of ESET, a global European leader in the cybersecurity market, have discovered the first UEFI bootkit designed for Linux systems, named Bootkitty by its creators. ESET believes this bootkit is likely an early proof of concept and, based on telemetry, has not yet been actively deployed. However, it represents the first evidence that UEFI bootkits are no longer limited to Windows systems. The main goal of the bootkit is to disable the kernel's signature verification feature and preload two as yet unknown ELF binaries via Linux's "init" process, which is the first process the kernel executes during system startup.

The previously unknown UEFI application, named bootkit.efi, has been uploaded to VirusTotal. Bootkitty is signed with a self-generated certificate, making it incompatible with systems that have UEFI Secure Boot enabled by default. However, it is designed to boot the Linux kernel without problems, regardless of the state of UEFI Secure Boot, because it modifies in memory the functions necessary for integrity verification.

The bootkit is an advanced rootkit, capable of replacing the boot loader and altering the kernel before its execution. Bootkitty allows the attacker to gain full control of the compromised machine by injecting itself into the boot process and executing malware before the operating system boots.

During the analysis, ESET identified a possibly related unsigned kernel module, which it named BCDropper. The evidence gathered suggests that it may have been developed by the same authors as Bootkitty. This module deploys an ELF binary responsible for loading another kernel module that was not yet identified at the time of analysis.

“Bootkitty contains numerous elements that suggest that, at the state of the art, it is a proof of concept and not an already widespread threat. However, even if the version present on VirusTotal does not currently pose a real threat to most Linux systems, as it can only affect some versions of Ubuntu, it highlights the importance of preparing for potential future threats,” explains Martin Smolár, researcher from ESET who analyzed Bootkitty. “To protect Linux systems from these threats, you need to ensure that UEFI Secure Boot is enabled, your firmware, security software and operating system are up to date, as well as your UEFI revocation list,” he adds.

During tests conducted in ESET's test environment, researchers observed that the kernel was marked as "tainted", which was not the case in the absence of the bootkit. Another method to check for the presence of the bootkit on a system with UEFI Secure Boot enabled is to attempt to load an unsigned kernel module at runtime. If the bootkit is present, the module will be loaded; otherwise, the kernel will refuse to do it. A simple solution to remove the bootkit, if it was distributed as /EFI/ubuntu/grubx64.efi, is to move the legitimate /EFI/ubuntu/grubx64-real.efi file to its original location, which is /EFI/ubuntu/ grubx64.efi.

In recent years, the UEFI threat landscape, particularly bootkits, has evolved significantly. It all started with the first proof of concept of a UEFI bootkit described by Andrea Allievi in ​​2012, which demonstrated the possibility of deploying bootkits on modern UEFI-based Windows systems, followed by many other PoCs (EfiGuard, Boot Backdoor, UEFI-bootkit ). It took several years to observe the first two real UEFI bootkits discovered (one of which, ESPecter, was spotted by ESET in 2021) and another two years before the infamous BlackLotus appeared – the first UEFI bootkit capable of bypassing UEFI Secure Boot on updated systems, discovered by ESET in 2023. A common element among these bootkits was their exclusive targeting towards Windows systems.

Tagged under: Eset

About Grandangolo Communications

What you can read next

D-Link presenta la nuova strategia per il canale
Vertiv completes CEO succession process
ESET launches 'Run with ESET' campaign

Customer Press Room

  • Vertiv contributed to the development of the VSIX data center in Padua: more connectivity and efficiency for the territory

    Una soluzione all’avanguardia per l&#8217...
  • ESET analyzes the tools of the APT Thewizards group, affiliated to China, with objectives in Asia and Middle East

    The experts of ESET Research have discovered and to ...
  • Sentinelone with Purple release to the 'Athena' extends the functionality of Deep Security Reasoning, Agentic Detection and Response and the Workflows of Hyperautomation to any Siem or data source

    The leader of cybersecurity to the new ...
  • D-Link brings intelligent connectivity to SPS Italia 2025: industrial solutions for automation and connected factory

    The Vendor presents industrial switches and routers ...
  • ESET expands MSP support with Kaseya Vsa X

    The Vendor integrates the protection solutions for ...

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP