MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: HybridPetya ransomware dodges UEFI Secure Boot
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$63,755.00-3.13%
  • ethereumEthereum(ETH)$1,843.32-3.14%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.35-2.08%
  • binancecoinBNB(BNB)$584.40-3.71%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$77.15-3.23%
  • tronTRON(TRX)$0.281184-0.96%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.50%
  • dogecoinDogecoin(DOGE)$0.091905-3.90%
Bitcoin

HybridPetya ransomware dodges UEFI Secure Boot

Last updated: September 13, 2025 5:10 am
Published: 5 months ago
Share

A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads.

ESET researchers discovered the ransomware-bootkit combo after samples were uploaded to VirusTotal in February, and named it HybridPetya because of its similarities to the infamous Petya and NotPetya malware strains.

The silver lining: the code seems to be just a proof-of-concept (PoC) at this point, and the threat hunters say they’ve seen no indications of its use in the wild. Also, it doesn’t show the same aggressive network propagation as NotPetya.

Still, HybridPetya provides yet another example that Secure Boot bypasses, which were still considered an infosec urban legend until a few years ago, do exist. And both ethical hackers and attackers alike are eager to develop new variants.

As Reg readers no doubt remember: back in 2017, malware dubbed NotPetya (because the data-wiping malware masqueraded as 2016’s Petya ransomware) exploded across the world, ultimately costing more than $10 billion in damages.

Both Petya and NotPetya also contained bootkits that overwrote the Master Boot Record (MBR) on infected computers, thus allowing the malware to lock up victims’ entire hard drive and prevent the OS from booting.

The new HybridPetya shares its disk-locking behavior with its predecessors and abuses UEFI vulnerability CVE‑2024‑7344, which ESET discovered and disclosed earlier this year and which Microsoft has since revoked in dbx on updated machines.

“HybridPetya is also capable of compromising modern UEFI-based systems by installing a malicious EFI application to the EFI System Partition,” ESET malware researcher Martin Smolár wrote in a Friday report. “The deployed UEFI application is then responsible for encryption of the NTFS-related Master File Table (MFT) file – an important metadata file containing information about all the files on the NTFS-formatted partition.”

HybridPetya, unlike the data-destroying NotPetya, also functions as ransomware. The algorithm used to generate the victim’s personal installation key allows the malware operator to reconstruct the decryption key from the personal installation key – and thus unlock the files – as opposed to just wiping them clean.

Similar to the two original Petya/NotPetya variants, upon execution, the UEFI bootkit loads its configuration from the EFIMicrosoftBootconfig file, and checks the current encryption status. This status can have one of three values:

If the value is 0, the bootkit rewrites the configuration file with the flag now set to 1 and encrypts the EFIMicrosoftBootverify file with the Salsa20 encryption algorithm, using the key and 8-byte-long nonce specified in the configuration data.

It also creates the file EFIMicrosoftBootcounter on the EFI System Partition – this file is used to keep track of the already encrypted disk clusters – and begins the disk encryption process, starting with the identification of all NTFS-formatted partitions.

The malware also displays a fake Windows “CHKDSK” message on the victim’s screen to indicate the disk is being checked for errors – not being encrypted. This message is identical to those displayed in both NotPetya and Petya.

Meanwhile, if the disk is already encrypted (so the encryption flag value is set to 1), the bootkit proceeds with a ransom note that, like the original NotPetya, begins: “Ooops, your important files are encrypted.”

It then instructs the victim to send $1,000 in Bitcoin to a now-empty wallet (34UNkKSGZZvf5AYbjkUa2yYYzw89ZLWxu2) to purchase the decryptor. Once the victim enters the correct key, verified by the bootkit, it then proceeds to decrypt the disk and record the legitimate bootloaders from a backup file created during the installation process. After that’s completed, the bootkit prompts the victim to reboot the device, and assuming everything worked, the OS should start up again.

“Although HybridPetya is not actively spreading, its technical capabilities – especially MFT encryption, UEFI system compatibility, and Secure Boot bypass – make it noteworthy for future threat monitoring,” Smolár wrote.

The discovery of HybridPetya follows three other real or PoC Secure Boot bypasses. Smolár wrote about the first, BlackLotus, back in 2023 after Kaspersky’s lead security researcher Sergey Lozhkin first saw it being sold on cybercrime marketplaces a year earlier.

Last November, ESET also spotted a bootkit targeting Linux systems dubbed Bootkitty after it was uploaded to VirusTotal.

Read more on TheRegister.com

This news is powered by TheRegister.com TheRegister.com

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Muted Sentiment In Crypto Markets
Bleeding Markets Reset — Which Long-Shot Tokens Could Shine in Uptober?
Trump’s Truth Social Hints at Launching Utility Token to Reward Users
Bitcoin drops nearly 18% in six months while the Nasdaq rallies 21%
Bitcoin Falters as Gold Hits Record $4,475, AI Stocks Command Capital | | CryptoRank.io

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Sean Ono Lennon Praises Bitcoin, Criticizes U.S. Money Printing – TokenPost
Next Article Ahead of summit, Quad looks to boost counter-terror cooperation | India News – The Times of India
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d