New HybridPetya Ransomware Bypasses UEFI Secure Boot Protection

by | Sep 15, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Discovery of HybridPetya

Researchers at ESET have identified a new ransomware strain dubbed HybridPetya, capable of bypassing UEFI Secure Boot to install a malicious bootkit in the EFI System Partition.

The malware was discovered on VirusTotal, and researchers suggest it may currently be a proof-of-concept (PoC), research project, or early-stage cybercrime tool. While not yet seen in active campaigns, its existence highlights the growing threat of ransomware targeting the UEFI boot process.


Links to Petya and NotPetya

HybridPetya borrows heavily from the infamous Petya and NotPetya malware that caused widespread disruption in 2016 and 2017.

It retains their visual style and attack chain, including bogus BSOD errors and fake CHKDSK messages, while introducing significant new features such as:

  • Installation into the EFI System Partition
  • Exploitation of CVE-2024-7344 to bypass Secure Boot
  • A functional decryption and restoration process for victims who pay
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Execution Logic

Once launched, HybridPetya checks if the target system uses UEFI with GPT partitioning. If confirmed, it drops multiple files into the EFI partition, including:

  • \EFI\Microsoft\Boot\config (encryption keys and victim ID)
  • \EFI\Microsoft\Boot\verify (decryption validation)
  • \EFI\Microsoft\Boot\counter (encryption progress tracker)
  • \EFI\Microsoft\Boot\bootmgfw.efi.old (backup of original bootloader)
  • \EFI\Microsoft\Boot\cloak.dat (XORed bootkit for bypass variant)

The ransomware replaces the original bootloader with the vulnerable reloader.efi and removes \EFI\Boot\bootx64.efi.

Execution logicExecution logic
Source: ESET

Victims are then forced into a reboot, triggering encryption of MFT clusters using Salsa20, while a fake CHKDSK screen hides the process.

Fake CHKDSK messageFake CHKDSK message
Source: ESET


Ransom Demand

After encryption completes, the system reboots again, and victims are shown a ransom note demanding $1,000 in Bitcoin.

The note offers a 32-character key that can be entered to:

  • Restore the original bootloader
  • Decrypt encrypted clusters
  • Reboot the system back to normal operation

Unlike NotPetya, which offered no recovery, HybridPetya includes a functional decryption mechanism, suggesting it is financially motivated.

HybridPetya's ransom noteHybridPetya’s ransom note
Source: ESET




Security Implications

Although no active HybridPetya attacks have been observed, its discovery adds to a growing list of UEFI bootkits with Secure Boot bypass capabilities, including BlackLotus, BootKitty, and Hyper-V Backdoor.

Indicators of compromise (IoCs) have been published on GitHub for defenders.

ESET and Microsoft recommend:

  • Applying January 2025 or later Windows updates
  • Maintaining offline backups of critical data
  • Monitoring systems for suspicious bootloader modifications

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: hackread.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This