Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
News

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Team-CWDBy Team-CWDSeptember 22, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems using a now-patched vulnerability disclosed earlier this year.

Slovakian cybersecurity company ESET said the samples were uploaded to the VirusTotal platform in February 2025.

“HybridPetya encrypts the Master File Table, which contains important metadata about all the files on NTFS-formatted partitions,” security researcher Martin Smolár said. “Unlike the original Petya/NotPetya, HybridPetya can compromise modern UEFI-based systems by installing a malicious EFI application onto the EFI System Partition.”

In other words, the deployed UEFI application is the central component that takes care of encrypting the Master File Table (MFT) file, which contains metadata related to all the files on the NTFS-formatted partition.

HybridPetya comes with two main components: a bootkit and an installer, with the former appearing in two distinct versions. The bootkit, which is deployed by the installer, is chiefly responsible for loading its configuration and checking its encryption status. It can have three different values –

  • 0 – ready for encryption
  • 1 – already encrypted, and
  • 2 – ransom paid, disk decrypted

Should the value be set to 0, it proceeds to set the flag to 1 and encrypts the “EFIMicrosoftBootverify” file with the Salsa20 encryption algorithm using the key and nonce specified in the configuration. It also creates a file called “EFIMicrosoftBootcounter” on the EFI System Partition prior to launching the disk encryption process of all NTFS-formatted partitions. The file is used to keep track of the already encrypted disk clusters.

Furthermore, the bootkit updates the fake CHKDSK message displayed on the victim’s screen with information about the current encryption status, while the victim is deceived into thinking that the system is repairing disk errors.

If the bootkit detects that the disk is already encrypted (i.e., the flag is set to 1), it serves a ransom note to the victim, demanding them to send $1,000 in Bitcoin to the specified wallet address (34UNkKSGZZvf5AYbjkUa2yYYzw89ZLWxu2). The wallet is currently empty, although it has received $183.32 between February and May 2025.

The ransom note screen also provides an option for the victim to enter the decryption key purchased from the operator after making the payment, following which the bootkit verifies the key and attempts to decrypt the “EFIMicrosoftBootverify” file. In the event the correct key is entered, the flag value is set to 2 and kicks off the decryption step by reading the contents of the “EFIMicrosoftBootcounter” file.

“The decryption stops when the number of decrypted clusters is equal to the value from the counter file,” Smolár said. “During the process of MFT decryption, the bootkit shows the current decryption process status.”

The decryption phase also involves the bootkit recovering the legitimate bootloaders — “EFIBootbootx64.efi” and “EFIMicrosoftBootbootmgfw.efi” — from the backups previously created during the installation process. Once this step is complete, the victim is prompted to reboot their Windows machine.

It’s worth noting that bootloader changes initiated by the installer during the deployment of the UEFI bootkit component triggers a system crash (aka Blue Screen of Death or BSoD) and ensures that the bootkit binary is executed once the device is turned on.

Select variants of HybridPetya, ESET added, have been found to exploit CVE‑2024‑7344 (CVSS score: 6.7), a remote code execution vulnerability in the Howyar Reloader UEFI application (“reloader.efi”, renamed in the artifact as “EFIMicrosoftBootbootmgfw.efi”) that could result in a Secure Boot bypass.

The variant also packs in a specially crafted file named “cloak.dat,” which is loadable through reloader.efi and contains the XORed bootkit binary. Microsoft has since revoked the old, vulnerable binary as part of its Patch Tuesday update for January 2025 update.

“When the reloader.efi binary (deployed as bootmgfw.efi) is executed during boot, it searches for the presence of the cloak.dat file on the EFI System Partition, and loads the embedded UEFI application from the file in a very unsafe way, completely ignoring any integrity checks, thus bypassing UEFI Secure Boot,” ESET said.

Another aspect where HybridPetya and NotPetya differ is that, unlike the latter’s destructive capabilities, the newly identified artifact allows the threat actors to reconstruct the decryption key from the victim’s personal installation keys.

CIS Build Kits

Telemetry data from ESET indicates no evidence of HybridPetya being used in the wild. The cybersecurity company also pointed out the recent discovery of a UEFI Petya Proof-of-Concept (PoC) by security researcher Aleksandra “Hasherezade” Doniec, adding it’s possible there could be “some relationship between the two cases.” However, it doesn’t rule out the possibility that HybridPetya may also be a PoC.

“HybridPetya is now at least the fourth publicly known example of a real or proof-of-concept UEFI bootkit with UEFI Secure Boot bypass functionality, joining BlackLotus (exploiting CVE‑2022‑21894), BootKitty (exploiting LogoFail), and the Hyper-V Backdoor PoC (exploiting CVE‑2020‑26200),” ESET said.

“This shows that Secure Boot bypasses are not just possible – they’re becoming more common and attractive to both researchers and attackers.”

UEFI, successor to the Basic Input/Output System (BIOS), is a lucrative target for attackers. Because UEFI runs before a machine’s operating system on startup, malware capable of infecting the boot process allows it to bypass traditional security software, execute malicious code with high-level privileges, and make it extremely stealthy and resilient to removal.

The discovery of HybridPetya comes as security researcher FFRI Security Kazuki Matsuo detailed a technique called Shade BIOS that allows malware to operate completely independent from operating system-level security and perform nefarious actions without hardware dependence at runtime.

It has been described as a “pure-BIOS” malware that retains BIOS in memory even after OS boot, allowing UEFI functionality and the use of drivers during runtime – giving it the power to subvert every single type of cybersecurity protection.

Shade BIOS “disassociate[s] UEFI malware from OS-level security,” Matsuo said in a Black Hat 2025 presentation last month, and that it doesn’t need to know what device the target is using or implement all driver stack or access I/O directly.



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWatch out for SVG files booby-trapped with malware
Next Article Airport Chaos Enters Third Day After Supply Chain Attack
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.