Close Menu
Technology News & TrendsTechnology News & Trends

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Facebook X (Twitter) Instagram
    Technology News & TrendsTechnology News & Trends
    Facebook X (Twitter) Instagram
    SUBSCRIBE
    • Home
    • Biz & IT

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Science

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Technology

      “Havard”-trained spa owner injected clients with bogus Botox, prosecutors say

      November 22, 2024

      The next Starship launch may occur in less than two weeks

      November 22, 2024

      For fame or a death wish? Kids’ TikTok challenge injuries stump psychiatrists

      November 22, 2024

      Nearly three years since launch, Webb is a hit among astronomers

      November 22, 2024

      Airborne microplastics aid in cloud formation

      November 22, 2024
    • Gaming

      Bazzite is the next best thing to SteamOS while we wait on Valve

      November 20, 2024

      Halls of Torment is Diablo cranked up to 50,000 kills/hour

      November 20, 2024

      GOG’s Preservation Program is the DRM-free store refocusing on the classics

      November 20, 2024

      How Valve made Half-Life 2 and set a new standard for future games

      November 20, 2024

      Dragon Age: The Veilguard and the choices you make while saving the world

      November 20, 2024
    • Gadgets

      Apple’s first Mac mini redesign in 14 years looks like a big aluminum Apple TV

      November 20, 2024

      GitHub Copilot moves beyond OpenAI models to support Claude 3.5, Gemini

      November 20, 2024

      Microsoft finally releases generic install ISOs for the Arm version of Windows

      November 20, 2024

      I, too, installed an open source garage door opener, and I’m loving it

      November 20, 2024

      Review: Amazon’s 2024 Kindle Paperwhite makes the best e-reader a little better

      November 20, 2024
    Technology News & TrendsTechnology News & Trends
    You are at:Home » Code found online exploits LogoFAIL to install Bootkitty Linux backdoor
    Biz & IT

    Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

    December 2, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Normally, Secure Boot prevents the UEFI from running all subsequent files unless they bear a digital signature certifying those files are trusted by the device maker. The exploit bypasses this protection by injecting shell code stashed in a malicious bitmap image displayed by the UEFI during the boot-up process. The injected code installs a cryptographic key that digitally signs a malicious GRUB file along with a backdoored image of the Linux kernel, both of which run during later stages of the boot process on Linux machines.

    The silent installation of this key induces the UEFI to treat the malicious GRUB and kernel image as trusted components, and thereby bypass Secure Boot protections. The final result is a backdoor slipped into the Linux kernel before any other security defenses are loaded.

    Diagram illustrating the execution flow of the LogoFAIL exploit Binarly found in the wild.


    Credit:

    Binarly

    In an online interview, HD Moore, CTO and co-founder at runZero and an expert in firmware-based malware, explained the Binarly report this way:

    The Binarly paper points to someone using the LogoFAIL bug to configure a UEFI payload that bypasses secure boot (firmware) by tricking the firmware into accepting their self-signed key (which is then stored in the firmware as the MOK variable). The evil code is still limited to the user-side of UEFI, but the LogoFAIL exploit does let them add their own signing key to the firmware’s allow list (but does not infect the firmware in any way otherwise).

    It’s still effectively a GRUB-based kernel backdoor versus a firmware backdoor, but it does abuse a firmware bug (LogoFAIL) to allow installation without user interaction (enrolling, rebooting, then accepting the new MOK signing key).

    In a normal secure boot setup, the admin generates a local key, uses this to sign their updated kernel/GRUB packages, tells the firmware to enroll the key they made, then after reboot, the admin has to accept this new key via the console (or remotely via bmc/ipmi/ilo/drac/etc bios console).

    In this setup, the attacker can replace the known-good GRUB + kernel with a backdoored version by enrolling their own signing key without user interaction via the LogoFAIL exploit, but it’s still effectively a GRUB-based bootkit, and doesn’t get hardcoded into the BIOS firmware or anything.

    Machines vulnerable to the exploit include some models sold by Acer, HP, Fujitsu, and Lenovo when they ship with a UEFI developed by manufacturer Insyde and run Linux. Evidence found in the exploit code indicates the exploit may be tailored for specific hardware configurations of such machines. Insyde issued a patch earlier this year that prevents the exploit from working. Unpatched devices remain vulnerable. Devices from these manufacturers that use non-Insyde UEFIs aren’t affected.

    Views: 3
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGoogle and Kairos sign nuclear reactor deal with aim to power AI
    Next Article Found on VirusTotal: The world’s first UEFI bootkit for Linux

    Related Posts

    Biz & IT

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024
    Biz & IT

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024
    Biz & IT

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Add A Comment

    Comments are closed.

    Technical Analysis for AAPL by TradingView
    Demo
    Top Posts

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured Reviews

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured Reviews 2 Mins Read
    8.1
    Trends

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Trends 2 Mins Read
    8.9
    Featured Reviews

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Featured Reviews 6 Mins Read

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    Our Picks

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    QNAP firmware update leaves NAS owners locked out of their boxes

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    Subscribe to Updates

    Stay updated with the latest breakthroughs in technology, innovation, and business trends from Faralogic.

    Technology News & Trends
    Facebook X (Twitter) Instagram Pinterest LinkedIn
    • User Agreement
    • Terms and Conditions
    • Disclaimer
    • About Us
    © 2025 FARALOGIC.

    Type above and press Enter to search. Press Esc to cancel.