The first UEFI bootkit malware for Linux has been detected, so users beware


  • ESET researchers discover ‘Bootkitty’, a unique UEFI boot kit for Linux
  • Bootkitty appears to be in the early stages of development, but could pose a major risk
  • Linux users warned to be wary of possible attacks

UEFI bootkits are reportedly making their way to Linux, ESET researchers have warned, after discovering a first-of-its-kind Linux UEFI bootkit, which appears to be either an experimental version or one in early stages of development.

UEFI bootkits are advanced malware that targets the Unified Extensible Firmware Interface (UEFI), which is responsible for booting an operating system and initializing hardware. These bootkits compromise the firmware at a low level, meaning that even reinstalling the operating system or even replacing the hard drive will not eliminate the presence of the malware. Even antivirus programs have difficulty recognizing them.