#Bootkit

2026-01-11

📢 LoJax : analyse complémentaire du bootkit UEFI et de sa chaîne de persistance
📝 Source : Malware Analysis Space (blog de Seeker/@clibm079, Chine), publié le 2 janvier 2026.
📖 cyberveille : cyberveille.ch/posts/2026-01-1
🌐 source : malwareanalysisspace.blogspot.
#Bootkit #IOC #Cyberveille

2025-09-13

Morning, cyber pros! It's been a bit quiet over the last 24 hours, but we've still got some critical updates on active threat actor campaigns targeting Salesforce and a new, noteworthy ransomware bootkit that bypasses Secure Boot. Let's dive in:

Cybercriminal Groups Target Salesforce Platforms ⚠️

- The FBI has issued a flash alert regarding two cybercriminal groups, UNC6040 and UNC6395, actively targeting organisations' Salesforce platforms for data theft and extortion.
- UNC6395 exploited compromised OAuth tokens for the Salesloft Drift application, stemming from a breach of Salesloft's GitHub account, leading to the app being taken offline.
- UNC6040, active since October 2024, uses sophisticated vishing campaigns to gain initial access, then leverages modified Salesforce Data Loader and custom Python scripts to exfiltrate large volumes of data.

📰 The Hacker News | thehackernews.com/2025/09/fbi-

HybridPetya Ransomware Bootkit Bypasses Secure Boot 🛡️

- ESET researchers have discovered HybridPetya, a new ransomware strain that functions as a bootkit, capable of bypassing UEFI Secure Boot on unrevoked Windows systems.
- This malware exploits the patched vulnerability CVE‑2024‑7344, which Microsoft has since revoked in dbx, and shares similarities with the infamous Petya and NotPetya strains, including a fake CHKDSK message during encryption.
- While currently a proof-of-concept with no observed in-the-wild use, HybridPetya is significant as the fourth publicly known bootkit to bypass Secure Boot, highlighting the ongoing evolution of firmware-level threats.

🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Ransomware #Bootkit #SecureBoot #UEFI #Salesforce #DataTheft #Extortion #Vishing #Cybercrime #InfoSec #FBI #ThreatActors

2025-09-12

A copycat of Petya/NotPetya malware, adding the capability of compromising UEFI-based systems & weaponizing vuln to bypass UEFI Secure Boot on outdated systems. #microsoft #malware #windows #systems #bootkit #vuln [ welivesecurity.com/en/eset-res ] #informatique

☣️ HybridPetya is now at least the fourth (4th) publicly known example of a real or PoC UEFI bootkit with UEFI Secure Boot bypass functionality.

kriware :verified:kriware@infosec.exchange
2025-09-12

Bootkitting Windows Sandbox

Explains how attackers can target Windows Sandbox through bootkits, bypassing isolation and achieving persistence.

secret.club/2022/08/29/bootkit

#Windows #Bootkit

Chema Alonso :verified:chemaalonso@ioc.exchange
2025-06-19

El lado del mal - Hacer un "infector" del Master Boot Record (MBR) de un PC usando Windows con ChatGPT & DeepSeek elladodelmal.com/2025/06/hacer #MBR #Malware #DeepSeek #ChatGPT #IA #AI #Windows #Ransomware #Bootkit

2025-06-10

Secure Boot just got a wake-up call—hackers are now exploiting a new flaw to slip bootkit malware past our digital bouncer. Ever wonder how secure your system really is?

thedefendopsdiaries.com/naviga

#secureboot
#cybersecurity
#vulnerabilities
#bootkit
#infosec

2025-02-10

New Microsoft Script updates Windows Media with Bootkit Malware Fixes.

Microsoft has released a PowerShell script to help Windows users and admins update bootable media so it utilizes the new "Windows UEFI CA 2023" certificate before the mitigations of the BlackLotus UEFI bootkit are enforced later this year.

download.microsoft.com/downloa

#windows #media #update #bootkit #it #security #privacy #engineer #tech #news

[ImageSource: Microsoft]

Script to apply CVE-2023-24932 mitigations to bootable Windows media.

The PowerShell script can be downloaded from Microsoft and can be used to update bootable media files for ISO CD/DVD image files, a USB flash drive, a local drive path or a network drive path.

To utilize the utility, you must first download and install the Windows ADK, which is necessary for this script to work correctly. When run, the script will update the media files to use the Windows UEFI CA 2023 certificate and install the boot managers signed by this certificate.

<https://learn.microsoft.com/windows-hardware/get-started/adk-install#winADK>

It is strongly advised that Windows admins test this process before the enforcement stage of the security updates is reached. Microsoft says this will happen by the end of 2026 and will give a six-month notice before it begins.
2025-01-20

Sehr interessanter Podcast zu Bootkitty!

Er fast die Geschehnisse um die Entdeckung des ersten UEFI-Boot-Kits für Linux sehr gut und anschaulich zusammen. Habe viel durch den Podcast gelernt.

Vielen Dank an @syt und @christopherkunz für diese tolle Folge von Passwort.

#linux #security #bootkit #bootkitty

passwort.podigee.io/23-bootkit

kriware :verified:kriware@infosec.exchange
2025-01-10

Analyzing the Evolution of VBS Rootkits

This blog explains what bootkits are and how the one we wrote works.

nsg650.github.io/blogs/29-12-2

#bootkit #rootkit

Scripter :verified_flashing:scripter@social.tchncs.de
2024-12-08

Researchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernels
thehackernews.com/2024/11/rese #Cybercrime #Linux #UefiBootkit #Bootkit #Bootkitty

2024-12-03

"The recently uncovered 'Bootkitty' #Linux UEFI #bootkit exploits the #LogoFAIL flaw, tracked as CVE-2023-40238, to target computers running on vulnerable firmware."
#malware #UEFIrootkit #Bootkitty #CyberSecurity
bleepingcomputer.com/news/secu

DansLeRuSH ᴱᶰdanslerush@floss.social
2024-12-03

#Bootkitty : Analyzing the first #UEFI bootkit for #Linux

« ESET researchers analyze the first UEFI bootkit designed for Linux systems » by Martin Smolár and Peter Strýček

welivesecurity.com/en/eset-res

#InfoSec #bootkit #SecureBoot

2024-12-02

Security Week 2449: «тренировочный» буткит для Linux

На прошлой неделе компания ESET сообщила об обнаружении буткита, конечной целью которого является атака систем на базе Linux. Задача любого буткита — выполнить вредоносный код до загрузки ядра системы. Это в теории обеспечивает широкие возможности контроля над атакуемым компьютером и затрудняет обнаружение вредоносного ПО. Закрепление буткита в прошивке UEFI также позволяет пережить полную переустановку ОС или замену жесткого диска. На практике реализовать подобную атаку достаточно сложно: известны лишь три примера реальных буткитов, закрепляющихся в UEFI. Из них только самый свежий, известный как BlackLotus , способен обойти систему Secure Boot, направленную как раз на блокировку выполнения «неавторизованного» кода на начальном этапе загрузки. Как и следовало ожидать, целью всех реальных буткитов является атака на ОС Windows. Именно поэтому Linux-буткит мог бы представлять особый интерес. Впрочем, в данном случае, как позднее выяснилось, речь не идет о реальном вредоносном ПО — это был учебный Proof of Concept, разработанный в рамках учебной программы по кибербезопасности в Южной Корее.разработанный корейскими студентами.

habr.com/ru/companies/kaspersk

#bootkit #bootkitty

2024-11-30

It’s only a real linux bootkit if it comes under an open-source license.

BTW it’s actually GNU/Bootkitty.

#rootkit #bootkit #bootkitty #shitpost #fuckthoseguys

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst