News
1. About this Repository This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware, firmware, and supply chain ...
A new Linux malware rootkit, Pumakit, has recently surfaced that manages to surreptitiously hide on affected systems. For now, this rootkit, which consists of multiple components, only affects Linux ...
The Threat of Linux Bootkits Recently, security researchers have been analyzing and publishing details about “Iranukit” and “Bootkitty,” malware that targets Linux systems with bootkits. Bootkitty has ...
BootKitty is not a new type of malware for cybercrime use, but a student semester project. Nevertheless, copycats from dark corners are unlikely to be long in coming. (cku) ...
LogoFAIL, image parsing vulnerabilities on Linux and Windows, are being actively abused Researchers are saying crooks are installing Bootkitty, the first-ever Linux UEFI bootkit Bootkitty works on ...
While not production-ready malware, ‘Bootkitty’ provides a proof of concept for exploiting Linux systems at boot-up — widening the UEFI attack path beyond the Windows ecosystem.
The recently uncovered 'Bootkitty' UEFI bootkit, the first malware of its kind targeting Linux systems, exploits CVE-2023-40238, aka 'LogoFAIL,' to infect computers running on a vulnerable UEFI ...
The discovery of a prototype UEFI bootkit targeting specific Ubuntu Linux setups has deepened with revelations linking its creation to a South Korean university project and the integration of a ...
The exploit aims to deploy a bootkit known as Bootkitty, which corrupts the boot process of Linux systems by injecting harmful code into the Unified Extensible Firmware Interface (UEFI). LogoFAIL was ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results