Security News “Bootkitty”: The First UEFI Bootkit Targeting Linux Systems

enaph

Level 29
Thread author
Verified
Honorary Member
Top Poster
Well-known
Jun 14, 2011
1,881
ESET researchers have uncovered Bootkitty, the first-ever UEFI bootkit designed to target Linux systems. This malware marks a significant evolution in the UEFI threat landscape, previously dominated by Windows-focused bootkits. While Bootkitty appears to be a proof-of-concept and has not yet been observed in active attacks, its existence signals a concerning shift for Linux-based platforms.

Bootkitty discovery and analysis​

ESET researchers Martin Smolár and Peter Strýček analyzed Bootkitty after a sample named bootkit.efi was uploaded to VirusTotal in November 2024. This UEFI bootkit was specifically tailored to a few Ubuntu Linux versions and signed with a self-signed certificate, limiting its functionality on systems with UEFI Secure Boot enabled—unless attackers had previously installed their certificates.

Bootkitty's main objectives include:

  1. Disabling kernel signature verification to permit unauthorized modules.
  2. Preloading unknown ELF binaries during the system's initialization phase.
  3. Patching GRUB and kernel functions in memory to bypass integrity checks.
Additionally, ESET identified a potentially related kernel module, BCDropper, and a secondary binary, BCObserver, linked to the bootkit's functionality.

Technical overview​

Bootkitty operates by leveraging the UEFI environment to manipulate the bootloader and kernel before the operating system initializes. The bootkit's primary functions are the following two:

  1. Hooks GRUB functions responsible for starting the Linux kernel, bypassing signature checks by modifying verification processes.
  2. Alters hardcoded offsets in the Linux kernel image to disable module signature checks and preload binaries via the LD_PRELOAD environment variable, a common tactic for injecting malicious code.
However, Bootkitty's use of hardcoded patterns and offsets makes it functional only in a narrow range of configurations. This limitation, combined with the presence of unused functions and artifacts, suggests that Bootkitty is an experimental or early-stage project rather than a mature malware tool.

exec-flow-593x1024.jpg


Bootkitty's execution flow
ESET

Connections to BCDropper and BCObserver​

ESET linked Bootkitty to a kernel module named BCDropper, which was also uploaded to VirusTotal. This module drops an ELF binary (BCObserver) into /opt/observer, which monitors system startup and loads another kernel module via finit_module. Despite the connections, ESET cannot definitively confirm the same authorship for Bootkitty and BCDropper.

BCDropper also exhibits rootkit capabilities, such as hiding processes, files, and ports, and the ability to self-conceal by removing its entry from the kernel module list.

Broader implications​

This discovery disrupts the belief that UEFI bootkits are exclusively Windows threats. Linux systems, widely used in enterprise servers and cloud environments, have largely been overlooked by attackers in the pre-boot phase. Bootkitty demonstrates how attackers could expand their arsenal to target these systems, even with limited reach in its current state.

ESET researchers emphasize that Bootkitty's capability to disable key security features, such as kernel signature verification, makes it a precursor to more sophisticated attacks.

ESET advises the following to mitigate UEFI bootkit threats like Bootkitty:

  • Enable UEFI Secure Boot to ensure all boot components are signed with trusted certificates.
  • Update firmware and operating systems regularly to reduce vulnerabilities exploitable by bootkits.
  • Monitor for anomalies like changes in kernel integrity, unexpected modules, or tampered files.
  • Restore legitimate files, such as GRUB loaders, to their original locations if tampering is detected.
While Bootkitty currently poses minimal risk due to its proof-of-concept status, its emergence highlights the need for proactive defense measures in Linux environments.
 

bazang

Level 8
Jul 3, 2024
365
“Bootkitty” is likely a proof-of-concept, but may portend working UEFI malware for Linux.

As ESET notes, the discovery is nonetheless significant because it demonstrates someone—most likely a malicious threat actor—is pouring resources and considerable know-how into creating working UEFI bootkits for Linux.

That threat actor is no doubt working on various ways to circumvent UEFI Secure Boot. Various general methods already exist. More refined methods specific to this class of UEFI bootkits will be a checkmate move. With such a UEFI bootkit Linux security will be grievously compromised. The operating system ecosystem will have to scramble to stay ahead of the threat. It is predicted that the threat actor shall target the biggest users of Linux - academic and governmental research institutions and then the global web services industry.

Lots of Linux users are even more unsafe than Windows users because they believe "We are secure because we use Linux. There are much less vulnerabilities and threats in the Linux world." No. Just, No.
 
Last edited by a moderator:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top