Tech

The first UEFI bootkit malware for Linux has been detected, so users beware

Share
Share


  • ESET researchers uncover ‘Bootkitty’, a first-of-its-kind UEFI bootkit for Linux
  • Bootkitty seems to be in early stages of development, but could pose a major risk
  • Linux users warned to be on their guard against possible attacks

UEFI bootkits are reportedly making their way into Linux, researchers from ESET have warned, after spotting a first-of-its-kind Linux UEFI bootkit, which seems to either be an experimental version, or a version in early development stages.

UEFI bootkits are sophisticated malware targeting the Unified Extensible Firmware Interface (UEFI), which is responsible for booting an operating system and initializing hardware. These bootkits compromise the firmware at a low level, meaning that even reinstalling the operating system, or even replacing the hard drive, does not eliminate the malware’s presence. Even antivirus programs have difficulties spotting them.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Customizable soft robot modules allow for new haptic interactions
Tech

Customizable soft robot modules allow for new haptic interactions

One possible configuration of the TangiBall. Credit: RRL EPFL/CC BY SA 4.0...

Amazon is apparently forcing some workers to relocate to its main office hubs
Tech

Amazon is apparently forcing some workers to relocate to its main office hubs

Amazon workers in Seattle, Arlington and Washington DC workers could have to...

Vision-language model creates plans for automated inspection of environments
Tech

Vision-language model creates plans for automated inspection of environments

Figure showing the pipeline of the team’s method. The input to their...