<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bootkitty Archives - MASSIVE News</title>
	<atom:link href="https://massive.news/tag/bootkitty/feed/" rel="self" type="application/rss+xml" />
	<link>https://massive.news/tag/bootkitty/</link>
	<description>Progressive Mix of World News and Propaganda</description>
	<lastBuildDate>Sat, 30 Nov 2024 08:16:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=7.0</generator>

<image>
	<url>https://massive.news/wp-content/uploads/2024/08/m-150x150.jpg</url>
	<title>bootkitty Archives - MASSIVE News</title>
	<link>https://massive.news/tag/bootkitty/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Code found online exploits LogoFAIL to install Bootkitty Linux backdoor</title>
		<link>https://massive.news/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor/</link>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Fri, 29 Nov 2024 21:37:00 +0000</pubDate>
				<category><![CDATA[World News]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[bootkitty]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[logofail]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[uefi]]></category>
		<category><![CDATA[unified extensible firmware interface]]></category>
		<guid isPermaLink="false">https://massive.news/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor/</guid>

					<description><![CDATA[<p>Normally, Secure Boot prevents the UEFI from running all subsequent files unless they bear a digital...</p>
<p>The post <a href="https://massive.news/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor/">Code found online exploits LogoFAIL to install Bootkitty Linux backdoor</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Normally, Secure Boot prevents the UEFI from running all subsequent files unless they bear a digital signature certifying those files are trusted by the device maker. The exploit bypasses this protection by injecting shell code stashed in a malicious bitmap image displayed by the UEFI&nbsp;during the boot-up process. The injected code installs a cryptographic key that digitally signs a malicious GRUB file along with a backdoored image of the Linux kernel, both of which run during later stages of the boot process on Linux machines.</p>
<p>The silent installation of this key induces the UEFI to treat the malicious GRUB and kernel image as trusted components, and thereby bypass Secure Boot protections. The final result is a backdoor slipped into the Linux kernel before any other security defenses are loaded.</p>
<figure class="ars-wp-img-shortcode id-2064098 align-fullwidth">
<div>
                        <img width="1999" height="1400" src="https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor.png" class="fullwidth full" alt decoding="async" loading="lazy" srcset="https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor.png 1999w, https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor-1.png 640w, https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor-2.png 1024w, https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor-3.png 768w, https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor-4.png 1536w, https://massive.news/wp-content/uploads/2024/11/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor-5.png 980w, https://cdn.arstechnica.net/wp-content/uploads/2024/11/logofail-exploit-execution-1440x1009.png 1440w" sizes="auto, (max-width: 1999px) 100vw, 1999px">
                  </div><figcaption readability="1.5">
<div class="caption font-impact mb-4 mt-2 inline-flex flex-row items-stretch gap-1 text-base leading-tight text-gray-300" readability="33">
<p>
      Diagram illustrating the execution flow of the LogoFAIL exploit Binarly found in the wild.</p>
<p>              <span class="caption-credit mt-2 text-xs"><br />
          Credit:</p>
<p>          Binarly</p>
<p>                  </span>
          </p>
</p></div>
</figcaption></figure>
<p>In an online interview, HD Moore, CTO and co-founder at runZero and an expert in firmware-based malware, explained the Binarly report this way:</p>
<blockquote readability="32">
<p>The Binarly paper points to someone using the LogoFAIL bug to configure a UEFI payload that bypasses secure boot (firmware) by tricking the firmware into accepting their self-signed key (which is then stored in the firmware as the MOK variable). The evil code is still limited to the user-side of UEFI, but the LogoFAIL exploit does let them add their own signing key to the firmware&#8217;s allow list (but does not infect the firmware in any way otherwise).</p>
<p>It&#8217;s still effectively a GRUB-based kernel backdoor versus a firmware backdoor, but it does abuse a firmware bug (LogoFAIL) to allow installation without user interaction (enrolling, rebooting, then accepting the new MOK signing key).</p>
<p>In a normal secure boot setup, the admin generates a local key, uses this to sign their updated kernel/GRUB packages, tells the firmware to enroll the key they made, then after reboot, the admin has to accept this new key via the console (or remotely via bmc/ipmi/ilo/drac/etc bios console).</p>
<p>In this setup, the attacker can replace the known-good GRUB + kernel with a backdoored version by enrolling their own signing key without user interaction via the LogoFAIL exploit, but it’s still effectively a GRUB-based bootkit, and doesn&#8217;t get hardcoded into the BIOS firmware or anything.</p>
</blockquote>
<p>Machines vulnerable to the exploit include some models sold by Acer, HP, Fujitsu, and Lenovo when they ship with a UEFI developed by manufacturer Insyde and run Linux. Evidence found in the exploit code indicates the exploit may be tailored for specific hardware configurations of such machines. Insyde issued a patch earlier this year that prevents the exploit from working. Unpatched devices remain vulnerable. Devices from these manufacturers that use non-Insyde UEFIs aren&#8217;t affected.</p>
<p>The post <a href="https://massive.news/code-found-online-exploits-logofail-to-install-bootkitty-linux-backdoor/">Code found online exploits LogoFAIL to install Bootkitty Linux backdoor</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
