The ‘Bootkitty’ Linux UEFI bootkit, an in-development malware primarily targeting specific Ubuntu versions, exploits the LogoFAIL flaw to attack computers running vulnerable firmware. Bootkitty uses shellcode within BMP files to bypass Secure Boot protections and inject rogue certifications into the system. The malware can potentially infect any unpatched device. Binarly, a firmware security firm that discovered LogoFAIL, emphasizes that fixes need to be deployed to minimise impressions from such vulnerabilities.

Thousands of TP-Link routers have been infected by a botnet to spread malware
A new botnet, Ballista, is exploiting a high-severity security flaw in TP-Link routers. The malware has spread to over 6,000 devices, predominantly in Brazil, Poland,