Bootkitty Bootkit Discovered in the Wild, Targeting Linux

Stephanie Adlam
5 Min Read
Bootkit named Bootkitty discovered in the wild, targeting Linux OS
Attackers have begun investing significant resources and time into developing bootkits for Linux.

Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI bootkit for Linux systems. The tool, called Bootkitty, is considered a proof-of-concept (PoC) and, according to experts, has not been employed in real attacks.

UEFI Bootkitty Bootkit Targeting Linux Systems

ESET analysts have reported the discovery of a new UEFI bootkit named Bootkitty, targeting Linux systems. Although currently a proof-of-concept, the malware signals a growing attacker focus on Linux bootkits. This area has traditionally been dominated by Windows-based threats, but as *NIX-based OS gains more and more user share, hackers switch their attention here.

Linux has a lot of vulnerabilties for hackers to exploit. See our blog post featuring 15 most dangerous Linux flaws – there may be several you should patch as soon as you can.

Bootkitty was uploaded to VirusTotal in November 2024 under the file name bootkit.efi. Researchers found that the malware is in the early stages of development, with limited effectiveness against specific Ubuntu versions. Its numerous technical flaws suggest that Bootkitty is not yet ready for real-world deployment. Experts believe it is being tested as a proof-of-concept.

Written in C, Bootkitty is designed to bypass Linux kernel signature verification. It uses a self-signed certificate, making it ineffective on systems with Secure Boot enabled unless the attackers’ certificates have already been installed. The malware specifically targets systems with certain versions of GRUB and the Ubuntu kernel. Indicators of compromise related to this malware have already been uploaded to GitHub.

ASCII art embedded in the bootkit screenshot
ASCII art embedded in the bootkit (source: ESET)

During execution, Bootkitty exploits UEFI protocols (EFI_SECURITY2_ARCH_PROTOCOL and EFI_SECURITY_ARCH_PROTOCOL) to bypass Secure Boot integrity checks. It manipulates the GRUB bootloader using functions like start_image and grub_verifiers_open to disable binary signature checks, including those for the Linux kernel. It also interferes with the kernel decompression process, modifying the module_sig_check function so that all kernel modules are falsely verified as secure.

To load its malicious components, the malware replaces the first environment variable with LD_PRELOAD=/opt/injector.so. This ensures that the malicious shared library is loaded into processes during system startup.

Real-World Attacks

In the known attack cases, hackers exploit the LogoFAIL flaw and other well-known vulnerabilities in UEFI firmware to install Bootkitty. For instance, certain exploits target improper input validation during the processing of splash screen images, which can result in arbitrary code execution.

What Is UEFI Bootkit?

UEFI Bootkit is a type of threat that aims to modify or spoof components of the UEFI, the system that controls the booting of an operating system. The main danger of a bootkit is that it operates at the level of the computer’s boot process. This means it gains control before the operating system starts and can persist even after the operating system is reinstalled.

Removing such a threat with anti-malware is not really an option. Complete bootkit malware removal requires either reinstalling the UEFI, which does not always guarantee complete removal of the threat, or flushing the UEFI with a programmer. In some cases, replacement of the motherboard may be required.

The user who uploaded Bootkitty to VirusTotal also submitted a kernel module named BCDropper, which installs an ELF file called BCObserver. This module functions as a rootkit, hiding files and processes while opening specific ports on the infected system.

Bootkitty’s welcome message screenshot
Bootkitty’s welcome message (source: ESET)

The code of Bootkitty and the module contains multiple references to “BlackCat”. One of the key clues is a phrase “Developed by BlackCat” that appears in some execution logs and in BCDropper’s code. However, the researchers caution that this does not confirm a connection to the eponymous ransomware group, especially considering it being deceased after its creators pulled a scam escape on their affiliates.

Bootkitty Bootkit Discovered in the Wild, Targeting Linux

TAGGED:
Share This Article
Follow:
I write about how to make your Internet browsing comfortable and safe. The modern digital world is worth being a part of, and I want to show you how to do it properly.
Leave a Comment

AI Assistant

Hello! 👋 How can I help you today?