DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

ESET Warns of HybridPetya Malware that Bypasses UEFI Secure Boot

DigitalCIO Bureau by DigitalCIO Bureau
September 15, 2025
in Security
0
ESET Warns of HybridPetya Malware that Bypasses UEFI Secure Boot
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

ESET Research has discovered a HybridPetya bootkit and ransomware uploaded from Poland to the malware-scanning platform VirusTotal. The sample is a copycat of the infamous Petya/NotPetya malware; however, it adds the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems.

“Late in July 2025, we encountered suspicious ransomware samples under various filenames, including notpetyanew.exe and other similar ones, suggesting a connection with the infamously destructive malware that struck Ukraine and many other countries back in 2017. The NotPetya attack is believed to be the most destructive cyberattack in history, with more than $10 billion in total damages. Due to the shared characteristics of the newly discovered samples with both Petya and NotPetya, we named this new malware HybridPetya,” says ESET researcher Martin Smolár, who made the discovery.

The algorithm used to generate the victim’s personal installation key, unlike in the original NotPetya, allows the malware operator to reconstruct the decryption key from the victim’s personal installation keys. Thus, HybridPetya remains viable as regular ransomware – more like Petya. Additionally, HybridPetya is also capable of compromising modern UEFI-based systems by installing a malicious EFI application to the EFI System Partition. The deployed UEFI application is then responsible for encryption of the NTFS-related Master File Table (MFT) file – an important metadata file containing information about all the files on the NTFS-formatted partition.

“After a bit more digging, we discovered something even more interesting on VirusTotal: an archive containing the whole EFI System Partition contents, including a very similar HybridPetya UEFI application, but this time bundled in a specially formatted cloak.dat file, vulnerable to CVE-2024-7344 – the UEFI Secure Boot bypass vulnerability that our team disclosed in early 2025,” adds Smolár. ESET publications from January 2025 purposely refrained from detailing the exploitation; thus, the malware author probably reconstructed the correct cloak.dat file format based on reverse engineering the vulnerable application on their own.

ESET telemetry shows no active use of HybridPetya in the wild yet; thus, HybridPetya may just be a proof of concept developed by a security researcher or an unknown threat actor. Furthermore, this malware does not exhibit the aggressive network propagation seen in the original NotPetya.

 

Tags: ESETUEFI
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Serious vulnerability in MongoDB makes cloud environments vulnerable

by DigitalCIO Bureau
December 29, 2025
0
Automated Breach And Attack Simulation – Can You Deny Its Relevance?

A serious security vulnerability in MongoDB, designated CVE-2025-14847 and nicknamed MongoBleed, allows attackers to extract sensitive data from the working memory of vulnerable systems without authentication. The vulnerability...

Read moreDetails

Cybercrime Will Become Increasingly Automated in 2026

by DigitalCIO Bureau
December 2, 2025
0
Trend Micro Named a Leader in Attack Surface Management in New Report

Trend Micro has released its annual Security Predictions Report for 2026, warning that the coming year will mark the true industrialization of cybercrime. Artificial intelligence (AI) and automation are now...

Read moreDetails

Salesforce Blocks Gainsight Apps After Detecting Suspicious Activity

by DigitalCIO Bureau
November 24, 2025
0
Salesforce Acquires AI Customer Service Startup Airkit.ai

CRM giant Salesforce has immediately blocked access to applications from software vendor Gainsight after detecting "unusual activity." The incident may have led to unauthorized access to customer data...

Read moreDetails

WatchGuard Introduces FireCloud Total Access

by DigitalCIO Bureau
September 29, 2025
0
Gartner: Adoption of GenAI To Collapse Cybersecurity Skills Gap

WatchGuard Technologies has announced FireCloud Total Access, the first hybrid secure access service edge (SASE) that breaks through the enterprise-only model and makes zero trust and cloud-delivered security practical...

Read moreDetails

Kaspersky Secures Large Language Models With New Course

by DigitalCIO Bureau
September 18, 2025
0

Kaspersky AI Technology Research Center has launched a new course offering cybersecurity professionals with the necessary knowledge to understand, evaluate, and defend against vulnerabilities in large language models...

Read moreDetails
Next Post
CrowdStrike Extends Its Elite MDR Services To Partners

CrowdStrike And Meta Introduce Benchmarks For AI In Cybersecurity

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Commvault Appoints Richard Gadd as Senior Vice President of EMEA and India

Commvault Appoints Richard Gadd as Senior Vice President of EMEA and India

October 5, 2023
Report Finds a 400% Increase in IoT and OT Malware Attacks

Zero Trust Security Reduces Cyber Insurance Claims

June 13, 2025

Accenture has good news for the whole of IT

April 1, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?