This week we dive into the BlackLotus UEFI bootkit teardown and find out how this malware has some roots in the FOSS ecosystem, plus we look at security updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
111 unique CVEs addressed
shim
and grub
- but not because they are exploiting any vulnerabilities in them,
but since they are very useful components if you want to boot your own
bootkitshim
and grub
) - but also a copy of a vulnerable
version of the Windows Boot Manager UEFI binary plus their own custom boot
configuration data - and since they have disabled BitLocker already these
will happily be loaded at next boot without the usual integrity checks etcgrub
is signed using this key whilst the shim
is Red Hat’s shim
-
unmodified and signed by Microsoft and hence trusted - this will then trust
their malicious grub
as it is signed by the key they just enrolled in the
MOKshim
is an unmodified copy, their grub
is not - and is actually
maliciousshim
then goes on to boot this malicious grub
which starts Windows but also
installs a bunch of UEFI memory hooks to be able to subvert further stages
of the boot process and eventually Windows itselfshim
in the future - perhaps, but it is not really shim
that
is at fault here - the issue is the original vulnerability in the Windows
Boot Manager - shim
just helps to make loading additional parts of their
bootkit easier (along with grub
) - so hopefully Microsoft don’t go down that
pathshim
’s did get revoked - but
revoking this Microsoft binary would mean many older systems may fail to
boot, including their recovery images and install media etc