What type of kitty is now out there causing havoc?

This is not the type of kitty you want on your system, especially if it is about to be in development stage.

This goes by several different names, and we can step through the article to determine what is going on here.

Linux

This goes by several names, just so everyone knows.

The recently uncovered ‘Bootkitty’ Linux UEFI bootkit exploits the LogoFAIL flaw, tracked as CVE-2023-40238, to target computers running on vulnerable firmware.

This is confirmed by firmware security firm Binarly, which discovered LogoFAIL in November 2023 and warned about its potential to be used in actual attacks.

The fact that we’ve not heard anything about this, as I’ve never have till now.

Bootkitty was discovered by ESET, who published a report last week, noting that it is the first UEFI bootkit specifically targeting Linux. However, at this time, it is more of an in-development UEFI malware that only works on specific Ubuntu versions, rather than a widespread threat.

The short version of LogoFail is that it uses a BMP file which mahy be used in a flawed BMP.

LogoFAIL is a set of flaws in the image-parsing code of UEFI firmware images used by various hardware vendors, exploitable by malicious images or logos planted on the EFI System Partition (ESP).

“When these images are parsed during boot, the vulnerability can be triggered and an attacker-controlled payload can arbitrarily be executed to hijack the execution flow and bypass security features like Secure Boot, including hardware-based Verified Boot mechanisms,” explained Binarly previously.

The exact process is made clear, but something I’ve never seen, shellcode within the BMP file itself. This is discussed within the article.

malicious image files
The image shows a directory listing with the heading “Index of /”. It includes file names, last modified dates, and sizes. Notable files are “logofail.bmp” (16M, modified on 2024-11-06) and “logofail_fake.bmp” (7.7K, modified on 2024-10-10), both highlighted with a red box. Other files such as “bootkit.efi” are also listed. The items are displayed in a table format, typical of a server directory index page.
To add insult to injury, a malicious certificate is also installed and used.

Bootkitty attack overview
The image is a flowchart illustrating a step-by-step process of a UEFI firmware attack. It shows an attacker copying files to the EFI System Partition, setting variables in NVRAM, and rebooting the device. The process continues with the execution of UEFI Firmware, which leads to exploitation and loading of malicious behavior through a sequence involving shimx64.efi and grubx64.efi files. The flowchart traces the execution and verification processes, exploiting a vulnerability labeled BRLY-LOGOFAIL-2023-002.
Right now, it seems to only work on Lenovo, but it could work on any one if it is made to.

Read the entire article BootKitty UEFI malware exploits LogoFAIL to infect Linux systems for complete details. Have fun!


Discover more from The Technology blog and podcast

Subscribe to get the latest posts sent to your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.