Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»HybridPetya Mimics NotPetya, Adds UEFI Compromise
News

HybridPetya Mimics NotPetya, Adds UEFI Compromise

Team-CWDBy Team-CWDSeptember 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform.

Uploaded in February 2025, the sample showed under filenames suggesting a link to the destructive NotPetya outbreak.

The malware shares substantial similarities to Petya and NotPetya but adds new capabilities that make it stand out, including the ability to compromise UEFI-based systems.

HybridPetya targets NTFS partitions by encrypting the Master File Table (MFT) – a core component that maps the locations of stored files.

Unlike NotPetya, which inflicted more than $10bn in global damages in 2017 by making recovery impossible, HybridPetya allows victims to restore access if the correct decryption key is supplied. This makes it behave more like conventional ransomware.

Analysis shows that the malware installs a malicious EFI application onto the EFI System Partition, ensuring persistence at a level deeper than the operating system.

In one version, HybridPetya also exploits CVE-2024-7344. This flaw enables attackers to bypass UEFI Secure Boot on unpatched systems by loading a specifically crafted cloak.dat file through a signed but vulnerable Microsoft application.

Some defining traits of HybridPetya include:

  • Encryption of the NTFS Master File Table with the Salsa20 algorithm

  • Installation of a UEFI bootkit that runs before Windows loads

  • Exploitation of CVE-2024-7344 to disable Secure Boot protections

  • Support for data recovery when the decryption key is entered

Read more on UEFI Secure Boot bypasses: New Bootkit “Bootkitty” Targets Linux Systems via UEFI

ESET Research, which analyzed the samples, has found no evidence that HybridPetya is actively spreading.

Unlike NotPetya, it does not contain self-propagating code designed to jump across networks. Still, its technical features are significant. By combining ransomware functions with firmware-level persistence and a Secure Boot bypass, HybridPetya demonstrates how attackers are experimenting with deeper, more resilient forms of compromise.

The discovery places HybridPetya alongside other advanced UEFI bootkits such as BlackLotus. Whether it proves to be an active weapon or merely a proof of concept, it underscores a trend: weaknesses in system startup protections are increasingly targeted and ransomware is adapting to exploit them.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleYou Didn’t Get Phished — You Onboarded the Attacker
Next Article Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.