UEFI bootkits, a sophisticated form of malware, have made their way into Linux, as researchers from ESET have discovered a first-of-its-kind Linux UEFI bootkit called 'Bootkitty'. It is either an experimental version or in early stages of development.
UEFI bootkits compromise the firmware at a low level, making them difficult to detect or remove even with reinstallation of the operating system. They can be used for espionage, surveillance, or launching other malicious activities.
Bootkitty, the discovered variant, is limited to targeting systems without Secure Boot and certain Ubuntu distributions. It has limitations in its functionality, making it less widely distributable.
While the impact of Bootkitty is currently insignificant, the presence of bootkits in Linux is concerning due to the large number of devices running on the OS.