ESET Flags Prototype UEFI Bootkit Targeting Linux

ESET Flags Prototype UEFI Bootkit Targeting Linux

November 27, 2024 at 12:07PM

ESET has identified a prototype UEFI bootkit, named Bootkitty, targeting specific Ubuntu Linux configurations, marking a shift from Windows-exclusive attacks. While still in development, Bootkitty aims to disable kernel signature verification, allowing unsigned modules to load. A related module, BCDropper, exhibits rootkit-like behavior.

**Meeting Takeaways:**

1. **Discovery of UEFI Bootkit:**
– ESET has reported the identification of a prototype UEFI bootkit named **Bootkitty**, specifically targeting certain configurations of **Ubuntu Linux**.
– This represents a shift as bootkit attacks expand beyond the traditionally targeted **Windows operating system**.

2. **Nature of Bootkitty:**
– Currently categorized as a **proof-of-concept**, it is not yet considered an active threat.
– Bootkitty is engineered to **disable kernel signature verification** for the Linux kernel and its modules, indicating potential vulnerabilities.

3. **Technical Details:**
– The bootkit modifies critical components such as the **GRUB bootloader** and kernel decompression routines.
– An unknown UEFI application, identified as **bootkit.efi**, was uploaded to **VirusTotal** in November 2024, which initiated the discovery.

4. **Operation Mechanism:**
– Bootkitty is set to allow the loading of **unsigned kernel modules**, bypassing UEFI Secure Boot protections.
– Its main function is to disable the kernel’s signature verification and preload unknown ELF binaries during the **Linux init process**.

5. **Related Threat – BCDropper:**
– A possibly associated kernel module named **BCDropper** was discovered, which displays rootkit-like behaviors such as hiding files and processes.
– This module may facilitate the loading of additional unsigned kernel modules, suggesting a potential developmental link with Bootkitty.

6. **Comparative Context:**
– UEFI bootkits have predominantly targeted Windows systems historically, with notable examples including **ESPecter**, **FinSpy**, and **BlackLotus**.
– The emergence of Bootkitty indicates an expanding threat landscape that may encourage increased scrutiny and defense strategies in the Linux ecosystem.

7. **Response Measures:**
– Following the emergence of similar threats, organizations, including Microsoft and the **NSA**, have released resources to improve threat detection and system hardening against bootkit infections.

These points summarize the essential findings and implications of the discussed bootkit, emphasizing the evolving nature of malware threats in different operating systems.

Full Article