Security

Research

First-ever UEFI bootkit for Linux in the works, experts say

Bootkitty doesn’t bite… yet


Security researchers say they've stumbled upon the first-ever UEFI bootkit targeting Linux, illustrating a key moment in the evolution of such tools.

Dubbed "Bootkitty" by Slovak security shop ESET, the first sample of the bootkit was detected on malware encyclopedia VirusTotal earlier this month.

The researchers, Martin Smolár and Peter Strýček, say it appears to only target a limited number of Ubuntu releases and there are signs it's only a proof of concept at the moment. It's not thought to be under active development or in wider use by any sophisticated offensive operators right now.

That said, the finding suggests work is being done to target a broader set of potential targets and dispels the previous thinking that UEFI bootkits are designed for Windows systems only.

The last major evolution in the bootkit realm was arguably BlackLotus and the finding that it can bypass Secure Boot.

ESET was again the source of this discovery in 2023, with Smolár confirming after a year of digging into the $5,000 bootkit that it made good on its adverts and does indeed bypass Windows 11 Secure Boot.

Bootkitty, however, is not that advanced just yet. It isn't able to run on Linux systems with Secure Boot enabled. The bootkit is a self-signed certificate so in order to run on Secure Boot-protected systems, the system would already have to have the attackers' certificates installed.

ESET's analysis found that Bootkitty hooks various functions to ensure the firmware doesn't verify or check its authentication status, and patches the decompressed kernel image.

Smolár and Strýček said the manner in which it patches the decompressed kernel image was a significant limitation of the bootkit in its current form. 

How so? The developers used unsophisticated hardcoded byte patterns to locate the functions it aims to modify, meaning its functionality is limited to only a few Ubuntu releases. These patterns could feasibly be tweaked to cover additional kernel or grand unified bootloader (GRUB) versions, though.

The researchers reckoned the same limiting byte patterns also meant that the bootkit often led to system crashes instead of a full compromise, which is presumably the intention.

Bootkitty's main functionality, right now, is to load potentially malicious ELF binaries and potentially a dropper that might have been developed by the same people or person behind Bootkitty itself, but the researchers aren't sure.

A separate analysis carried out by a malware developer and reverse engineer who uses the humzak711 alias indicated that the binaries were used to load new stages of the bootkit. 

It also concluded that Bootkitty is highly modular and in its current stage of development, many components were merely placeholders, suggesting it is very much in its infancy and that more capabilities are coming with time.

The researchers dubbed the tool Bootkitty based on printed strings discovered during its execution. For one, ASCII art is displayed showing the word "Bootkitty," and the phrase "Bootkitty's bootkit" appears in subsequent printed strings too.

Also printed are the names of the supposed creators and others who assisted them in the development, although Smolár and Strýček couldn't track down any significant histories for any of them.

Additionally, Bootkitty references "BlackCat" a number of times, both during the initial printed strings upon execution ("Developed by BlackCat") and at various points in a loadable kernel module – the aforementioned dropper – loosely suggesting that the kernel module and Bootkitty itself were developed by the same people.

What it doesn't suggest, the researchers believe, is that there is a link between the developers of Bootkitty and the former ransomware crew ALPHV/BlackCat.

Not only is the bootkit not ransomware, but it's also written in C, while the devs behind the ransomware that scythed Change Healthcare and many others before it, was written in Rust.

"Whether a proof of concept or not, Bootkitty marks an interesting move forward in the UEFI threat landscape, breaking the belief about modern UEFI bootkits being Windows-exclusive threats," said the researchers. 

"Even though the current version from VirusTotal does not, at the moment, represent a real threat to the majority of Linux systems, it emphasizes the necessity of being prepared for potential future threats." ®

Send us news
14 Comments

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

XCSSET macOS malware returns with first new version since 2022

Known for popping zero-days of yesteryear, Microsoft puts Apple devs on high alert

The Doom-in-a-PDF dev is back – this time with Linux

What's next, Crysis-in-a-CSV?

Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable

Nobody wants memory bugs. Penguinistas continue debate on how to squish 'em

Cybersecurity not the hiring-'em-like-hotcakes role it once was

Ghost positions, HR AI no help – biz should talk to infosec staff and create 'realistic' job outline, say experts

After clash over Rust in Linux, now Asahi lead quits distro, slams Linus' kernel leadership

I fought the Torv and ... the Torv won

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

OBS-tacle course: Fedora and Flathub's Flatpak fiasco sparks repo rumble

Dispute settled, but not the causes

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations