Linux, LogoFAIL and Bootkitty
Ars Technica · 2d
Code found online exploits LogoFAIL to install Bootkitty Linux backdoor
These exploits are able to override an industry-standard defense known as Secure Boot and execute malicious firmware early in the boot process. Until now, there were no public indications that LogoFAIL exploits were circulating in the wild.
The Munich Eye · 6h
New Exploit Targets LogoFAIL Vulnerability to Deploy Bootkitty Linux Malware
Recent cybersecurity research has unveiled malicious code that takes advantage of a significant firmware vulnerability, known as LogoFAIL, to implant a backdoor into Linux systems. The exploit specifically targets devices from manufacturers such as Acer, HP, Fujitsu, and Lenovo that still operate with unpatched firmware.
Infosecurity-magazine.com · 4d
New Bootkit “Bootkitty” Targets Linux Systems via UEFI
Cybersecurity researchers have discovered “Bootkitty,” possibly the first UEFI bootkit specifically designed to target Linux systems. This marks a significant shift in the UEFI threat landscape, which previously focused exclusively on Windows-based attacks.
The Hacker News · 4d
Researchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernels
Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use in real-world attacks. Also tracked as IranuKit, it was uploaded to the VirusTotal platform on November 5, 2024.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results