DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

ESET Warns of HybridPetya Malware that Bypasses UEFI Secure Boot

DigitalCIO Bureau by DigitalCIO Bureau
September 15, 2025
in Security
0
ESET Warns of HybridPetya Malware that Bypasses UEFI Secure Boot
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

ESET Research has discovered a HybridPetya bootkit and ransomware uploaded from Poland to the malware-scanning platform VirusTotal. The sample is a copycat of the infamous Petya/NotPetya malware; however, it adds the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems.

“Late in July 2025, we encountered suspicious ransomware samples under various filenames, including notpetyanew.exe and other similar ones, suggesting a connection with the infamously destructive malware that struck Ukraine and many other countries back in 2017. The NotPetya attack is believed to be the most destructive cyberattack in history, with more than $10 billion in total damages. Due to the shared characteristics of the newly discovered samples with both Petya and NotPetya, we named this new malware HybridPetya,” says ESET researcher Martin Smolár, who made the discovery.

The algorithm used to generate the victim’s personal installation key, unlike in the original NotPetya, allows the malware operator to reconstruct the decryption key from the victim’s personal installation keys. Thus, HybridPetya remains viable as regular ransomware – more like Petya. Additionally, HybridPetya is also capable of compromising modern UEFI-based systems by installing a malicious EFI application to the EFI System Partition. The deployed UEFI application is then responsible for encryption of the NTFS-related Master File Table (MFT) file – an important metadata file containing information about all the files on the NTFS-formatted partition.

“After a bit more digging, we discovered something even more interesting on VirusTotal: an archive containing the whole EFI System Partition contents, including a very similar HybridPetya UEFI application, but this time bundled in a specially formatted cloak.dat file, vulnerable to CVE-2024-7344 – the UEFI Secure Boot bypass vulnerability that our team disclosed in early 2025,” adds Smolár. ESET publications from January 2025 purposely refrained from detailing the exploitation; thus, the malware author probably reconstructed the correct cloak.dat file format based on reverse engineering the vulnerable application on their own.

ESET telemetry shows no active use of HybridPetya in the wild yet; thus, HybridPetya may just be a proof of concept developed by a security researcher or an unknown threat actor. Furthermore, this malware does not exhibit the aggressive network propagation seen in the original NotPetya.

 

Tags: ESETUEFI
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Cloudflare Integrates With Leading AI Tools

by DigitalCIO Bureau
August 28, 2025
0
Cloudflare Launches One-Click Content Credentials

Cloudflare has become the first Cloud Access Security Broker (CASB) to integrate with all three of the leading generative AI tools – ChatGPT Enterprise, Claude by Anthropic and Google...

Read moreDetails

Cohesity Catalyst1 To Highlight AI & Resilience Innovations

by DigitalCIO Bureau
August 22, 2025
0
Cohesity Appoints Srinivasan Murari as Chief Development Officer

Cohesity will host its Catalyst 1 virtual event on September 17-18, 2025. Attendees will hear from data security leaders, including Capstone Research Corp., US Foods, The Weather Channel,...

Read moreDetails

CrowdStrike Releases Threat Hunting Report 2025

by DigitalCIO Bureau
August 5, 2025
0
CrowdStrike Named A Leader In Cloud Workload Security By Forrester

CrowdStrike has released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are weaponizing GenAI to scale operations and accelerate attacks – and increasingly...

Read moreDetails

Tenable releases its 2025 Cloud Security Risk Report

by DigitalCIO Bureau
July 3, 2025
0
Tenable releases its 2025 Cloud Security Risk Report

Tenable releases its 2025 Cloud Security Risk Report, revealing that cloud workloads supporting artificial intelligence (AI) initiatives are more vulnerable than traditional workloads. The report found that 70...

Read moreDetails

France accuses Russia of cyber attacks

by DigitalCIO Bureau
May 2, 2025
0
France accuses Russia of cyber attacks

France has accused Russia's GRU military intelligence agency of carrying out cyber attacks on French institutions, and the Paris Olympics since 2021 in an attempt to destabilise France....

Read moreDetails
Next Post
CrowdStrike Extends Its Elite MDR Services To Partners

CrowdStrike And Meta Introduce Benchmarks For AI In Cybersecurity

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Veeam Launches Cyber Secure Program to Help Enterprises Protect and Recover from Ransomware Attacks

Veeam Strengthens Data Resilience Through Integration With Splunk

July 25, 2024
Pax8 Introduces Era of Managed Intelligence

Pax8 Introduces Era of Managed Intelligence

June 19, 2025
AI-Driven Data Creation Fuels Cloud Storage Growth

AI-Driven Data Creation Fuels Cloud Storage Growth

January 16, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?