UEFI boot kits are modern malware that infiltrates the Unified Extensible Firmware Interface (UEFI), a critical system component responsible for initializing hardware and loading the operating system. Once infected, even reinstalling the operating system or replacing the hard drive cannot eliminate the malware, making it extremely difficult to detect and remove.
Bootkitty specifically targets some Ubuntu distributions by relying on a self-signed certificate that bypasses Secure Boot protection. However, design flaws include hard-coded byte patterns, lack of kernel version control, and unused features, resulting in a “limited” attack range.
Despite existing restrictions, the emergence of Bootkitty points to a worrying evolution of malware targeting Linux, experts say.
Source: Ferra

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.