Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

Date:

Share:


Normally, Secure Boot prevents the UEFI from running all subsequent files unless they bear a digital signature certifying those files are trusted by the device maker. The exploit bypasses this protection by injecting shell code stashed in a malicious bitmap image displayed by the UEFI during the boot-up process. The injected code installs a cryptographic key that digitally signs a malicious GRUB file along with a backdoored image of the Linux kernel, both of which run during later stages of the boot process on Linux machines.

The silent installation of this key induces the UEFI to treat the malicious GRUB and kernel image as trusted components, and thereby bypass Secure Boot protections. The final result is a backdoor slipped into the Linux kernel before any other security defenses are loaded.

Diagram illustrating the execution flow of the LogoFAIL exploit Binarly found in the wild.


Credit:

Binarly

In an online interview, HD Moore, CTO and co-founder at runZero and an expert in firmware-based malware, explained the Binarly report this way:

The Binarly paper points to someone using the LogoFAIL bug to configure a UEFI payload that bypasses secure boot (firmware) by tricking the firmware into accepting their self-signed key (which is then stored in the firmware as the MOK variable). The evil code is still limited to the user-side of UEFI, but the LogoFAIL exploit does let them add their own signing key to the firmware’s allow list (but does not infect the firmware in any way otherwise).

It’s still effectively a GRUB-based kernel backdoor versus a firmware backdoor, but it does abuse a firmware bug (LogoFAIL) to allow installation without user interaction (enrolling, rebooting, then accepting the new MOK signing key).

In a normal secure boot setup, the admin generates a local key, uses this to sign their updated kernel/GRUB packages, tells the firmware to enroll the key they made, then after reboot, the admin has to accept this new key via the console (or remotely via bmc/ipmi/ilo/drac/etc bios console).

In this setup, the attacker can replace the known-good GRUB + kernel with a backdoored version by enrolling their own signing key without user interaction via the LogoFAIL exploit, but it’s still effectively a GRUB-based bootkit, and doesn’t get hardcoded into the BIOS firmware or anything.

Machines vulnerable to the exploit include some models sold by Acer, HP, Fujitsu, and Lenovo when they ship with a UEFI developed by manufacturer Insyde and run Linux. Evidence found in the exploit code indicates the exploit may be tailored for specific hardware configurations of such machines. Insyde issued a patch earlier this year that prevents the exploit from working. Unpatched devices remain vulnerable. Devices from these manufacturers that use non-Insyde UEFIs aren’t affected.



Source link

━ more like this

Ryanair Boeing 737 from the UK crashes on runway – London Business News | Londonlovesbusiness.com

A Ryanair Boeing 737 from the UK to Greece has crashed on a runway leaving passengers terrified. The Ryanair flight crashed into a barrier...

Netflix signs deal to host live TV channels in France

Everything old is new again. Netflix just inked a deal to , turning the streaming giant into, well, regular TV. The platform will...

Amazon Prime Day 2025: The best early deals available now, dates and everything else you need to know

Now that we know Amazon Prime Day will be coming up soon on July 8-11, it’s time to start thinking about what you...

Samsung SmartTag 2 trackers are 38 percent off ahead of Prime Day

You likely have a million things to take with you when you leave the house each day — phone, wallet, keys and much...

Fighter jets scrambled as ‘bomb threat’ declared on flight – London Business News | Londonlovesbusiness.com

Portuguese Air Force scrambled their fighter jets on Thursday after a “bomb threat” was declared onboard a passenger jet which is believed to...
spot_img