UEFI boot kits are modern malware that infiltrates the Unified Extensible Firmware Interface (UEFI), a critical system component responsible for initializing hardware and loading the operating system. Once infected, even reinstalling the operating system or replacing the hard drive cannot eliminate the malware, making it extremely difficult to detect and remove.

Bootkitty specifically targets some Ubuntu distributions by relying on a self-signed certificate that bypasses Secure Boot protection. However, design flaws include hard-coded byte patterns, lack of kernel version control, and unused features, resulting in a “limited” attack range.

Despite existing restrictions, the emergence of Bootkitty points to a worrying evolution of malware targeting Linux, experts say.

Source: Ferra

Previous articleA sexologist announces a decline in libido among Russian youthFitness and health30 November 2024, 01:45
Next articleASL launches the first RTX 4060 video card in the compact Mini-ITX formatComputersNovember 30, 2024 03:00
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here