Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)
    • Today’s NYT Strands Hints, Answer and Help for April 20 #778
    • KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.
    • OneOdio Focus A1 Pro review
    • The 11 Best Fans to Buy Before It Gets Hot Again (2026)
    • A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)
    • ‘Euphoria’ Season 3 Release Schedule: When Does Episode 2 Come Out?
    • Francis Bacon and the Scientific Method
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Code found online exploits LogoFAIL to install Bootkitty Linux backdoor
    News

    Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

    Editor Times FeaturedBy Editor Times FeaturedDecember 2, 2024No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Usually, Safe Boot prevents the UEFI from operating all subsequent recordsdata until they bear a digital signature certifying these recordsdata are trusted by the system maker. The exploit bypasses this safety by injecting shell code stashed in a malicious bitmap picture displayed by the UEFI throughout the boot-up course of. The injected code installs a cryptographic key that digitally indicators a malicious GRUB file together with a backdoored picture of the Linux kernel, each of which run throughout later phases of the boot course of on Linux machines.

    The silent set up of this key induces the UEFI to deal with the malicious GRUB and kernel picture as trusted elements, and thereby bypass Safe Boot protections. The ultimate result’s a backdoor slipped into the Linux kernel earlier than some other safety defenses are loaded.

    Diagram illustrating the execution circulation of the LogoFAIL exploit Binarly discovered within the wild.


    Credit score:

    Binarly

    In a web-based interview, HD Moore, CTO and co-founder at runZero and an skilled in firmware-based malware, defined the Binarly report this fashion:

    The Binarly paper factors to somebody utilizing the LogoFAIL bug to configure a UEFI payload that bypasses safe boot (firmware) by tricking the firmware into accepting their self-signed key (which is then saved within the firmware because the MOK variable). The evil code remains to be restricted to the user-side of UEFI, however the LogoFAIL exploit does allow them to add their very own signing key to the firmware’s enable record (however doesn’t infect the firmware in any means in any other case).

    It is nonetheless successfully a GRUB-based kernel backdoor versus a firmware backdoor, nevertheless it does abuse a firmware bug (LogoFAIL) to permit set up with out consumer interplay (enrolling, rebooting, then accepting the brand new MOK signing key).

    In a traditional safe boot setup, the admin generates an area key, makes use of this to signal their up to date kernel/GRUB packages, tells the firmware to enroll the important thing they made, then after reboot, the admin has to just accept this new key through the console (or remotely through bmc/ipmi/ilo/drac/and many others bios console).

    On this setup, the attacker can substitute the known-good GRUB + kernel with a backdoored model by enrolling their very own signing key with out consumer interplay through the LogoFAIL exploit, nevertheless it’s nonetheless successfully a GRUB-based bootkit, and does not get hardcoded into the BIOS firmware or something.

    Machines susceptible to the exploit embrace some fashions bought by Acer, HP, Fujitsu, and Lenovo after they ship with a UEFI developed by producer Insyde and run Linux. Proof discovered within the exploit code signifies the exploit could also be tailor-made for particular {hardware} configurations of such machines. Insyde issued a patch earlier this yr that stops the exploit from working. Unpatched gadgets stay susceptible. Gadgets from these producers that use non-Insyde UEFIs aren’t affected.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026

    Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)

    April 19, 2026

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Binance and Bitget to probe a rally in RaveDAO’s RAVE token, which surged 4,500% in a week, after ZachXBT alleged RAVE insiders engineered a large short squeeze (Francisco Rodrigues/CoinDesk)

    April 19, 2026

    Comments are closed.

    Editors Picks

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    Today’s NYT Strands Hints, Answer and Help for April 20 #778

    April 19, 2026

    KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.

    April 19, 2026

    OneOdio Focus A1 Pro review

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Sweden expands gambling credit ban ahead of casino shutdown nationwide push

    February 19, 2026

    Using LangGraph and MCP Servers to Create My Own Voice Assistant

    September 7, 2025

    Premier League Soccer: Stream Leicester vs. Ipswich Live From Anywhere

    May 18, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.