Bootkitty: First UEFI Bootkit Malware Targeting Linux Systems Discovered

· 1 min read

article picture

Security researchers have discovered Bootkitty, a groundbreaking piece of malware that marks the first known UEFI bootkit specifically targeting Linux-based malware systems. This discovery signals a concerning expansion of sophisticated boot-level threats beyond the Windows ecosystem.

UEFI bootkits are particularly dangerous forms of malware that infect a computer's firmware, allowing them to persist even after operating system reinstallation and survive hard drive replacements. Until now, these threats exclusively targeted Windows systems.

Named Bootkitty by its creators, this new bootkit appears to be a proof-of-concept rather than an active threat in the wild. Its primary function is to disable Linux kernel signature verification and load unauthorized programs during the system startup process.

The malware accomplishes this by interfering with the Linux init process - the first program that runs when the operating system starts. Through this manipulation, Bootkitty can preload malicious code that would normally be blocked by the system's security measures.

During their investigation, researchers also uncovered an unsigned kernel module that shares characteristics with Bootkitty, suggesting common authorship. This module is designed to deploy additional malicious code into the system.

While Bootkitty has not been observed in real-world attacks, its emergence highlights a concerning trend in malware development. The expansion of bootkit capabilities to Linux systems indicates that threat actors are actively exploring new platforms and vectors for attacks.

This discovery follows a series of notable UEFI bootkit developments, including the 2023 discovery of BlackLotus - the first bootkit capable of bypassing UEFI Secure Boot on current systems. As these threats continue to evolve, both Windows and Linux users must remain vigilant about firmware-level security.