This week we dive into the BlackLotus UEFI bootkit teardown and find out how this malware has some roots in the FOSS ecosystem, plus we look at security updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
111 unique CVEs addressed
shim
and grub - but not because they are exploiting any vulnerabilities in them,
but since they are very useful components if you want to boot your own
bootkitshim and grub) - but also a copy of a vulnerable
version of the Windows Boot Manager UEFI binary plus their own custom boot
configuration data - and since they have disabled BitLocker already these
will happily be loaded at next boot without the usual integrity checks etcgrub is signed using this key whilst the shim is Red Hat’s shim -
unmodified and signed by Microsoft and hence trusted - this will then trust
their malicious grub as it is signed by the key they just enrolled in the
MOKshim is an unmodified copy, their grub is not - and is actually
maliciousshim then goes on to boot this malicious grub which starts Windows but also
installs a bunch of UEFI memory hooks to be able to subvert further stages
of the boot process and eventually Windows itselfshim in the future - perhaps, but it is not really shim that
is at fault here - the issue is the original vulnerability in the Windows
Boot Manager - shim just helps to make loading additional parts of their
bootkit easier (along with grub) - so hopefully Microsoft don’t go down that
pathshim’s did get revoked - but
revoking this Microsoft binary would mean many older systems may fail to
boot, including their recovery images and install media etc