Description
BootKitty is a newly identified UEFI (Unified Extensible Firmware Interface) bootkit targeting Linux systems, exploiting a firmware vulnerability known as LogoFAIL (CVE-2023-40238). Discovered by ESET and linked to cybersecurity students in Korea’s Best of the Best (BoB) training program, the bootkit demonstrates the potential risks of unpatched firmware vulnerabilities, particularly in Secure Boot mechanisms. Though still in development, BootKitty highlights the significant dangers of LogoFAIL exploits on specific hardware.
Attack Details
The LogoFAIL vulnerability, found in the UEFI firmware image-parsing code, allows attackers to execute arbitrary code during the boot process. This is achieved using malicious BMP image files, such as ‘logofail.bmp,’ embedded with shellcode that bypasses Secure Boot protections by injecting rogue certificates and enabling the execution of a malicious bootloader (‘bootkit.efi’) while erasing evidence of tampering. BootKitty, a malware exploiting this flaw, has been found effective on firmware modules from Acer, HP, Fujitsu, and particularly Lenovo devices running Insyde firmware, including models like Lenovo IdeaPad and Legion. Although currently in a testing phase, BootKitty’s compatibility may expand, posing significant risks as it compromises Secure Boot’s integrity, leaving vulnerable systems exposed to persistent attacks, especially as many affected models remain unpatched against LogoFAIL.
Indicators of Compromise (IOCs)
Malicious Files:
Remediation
BootKitty serves as a critical reminder of the importance of addressing firmware vulnerabilities promptly, as delays in mitigation can lead to severe consequences for both individuals and organizations.
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: BootKitty UEFI Malware Exploits LogoFAIL to Infect Linux Systems
References