Malware
Bootkit
Also known as: Boot rootkit, MBR rootkit
Definition
Malware that infects the boot process — MBR, VBR, or UEFI — to load before the operating system and obtain persistent, privileged control.
Examples
- BlackLotus, a UEFI bootkit able to bypass Secure Boot on patched systems.
- MoonBounce, an APT-grade UEFI firmware implant.
Related terms
Rootkit
Stealth malware that grants and hides privileged access to an operating system or device, evading detection by standard tools.
UEFI Rootkit
A rootkit implanted in UEFI firmware that loads before the OS, persists across disk wipes, and bypasses most endpoint security.
BIOS Rootkit
A rootkit that infects legacy BIOS firmware so it executes before the operating system, achieving deep persistence below the OS.
Boot Sector Virus
A virus that infects the boot sector or master boot record of a disk so it runs before the operating system loads.
Firmware Malware
Malicious code that lives in device firmware — BIOS/UEFI, network cards, drives, or peripherals — surviving OS reinstalls and most endpoint defences.
Malware
Any software intentionally designed to disrupt, damage, or gain unauthorized access to computers, networks, or data.