{"id":17920,"date":"2025-09-13T02:49:08","date_gmt":"2025-09-13T02:49:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/17920\/"},"modified":"2025-09-13T02:49:08","modified_gmt":"2025-09-13T02:49:08","slug":"eset-research-discovers-uefi-compatible-hybridpetya","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/17920\/","title":{"rendered":"ESET Research discovers UEFI-compatible HybridPetya"},"content":{"rendered":"<p>ESET Research has discovered new ransomware samples, which it has named HybridPetya, resembling the infamous Petya\/NotPetya malware. They were uploaded to VirusTotal in February 2025.HybridPetya encrypts the Master File Table, which contains important metadata about all the files on NTFS-formatted partitions.Unlike the original Petya\/NotPetya, HybridPetya can compromise modern UEFI-based systems by installing a malicious EFI application onto the EFI System Partition.One of the analyzed HybridPetya variants exploits CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems, leveraging a specially crafted cloak.dat file.ESET telemetry shows no signs of HybridPetya being used in the wild yet.  <\/p>\n<p align=\"justify\">BRATISLAVA, Slovakia, Sept.  12, 2025  (GLOBE NEWSWIRE) &#8212; ESET Research has discovered a HybridPetya bootkit and ransomware uploaded from Poland to the malware-scanning platform VirusTotal. The sample is a copycat of the infamous Petya\/NotPetya malware; however, it adds the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems.<\/p>\n<p align=\"justify\">\u201cLate in July 2025, we encountered suspicious ransomware samples under various filenames, including notpetyanew.exe and other similar ones, suggesting a connection with the infamously destructive malware that struck Ukraine and many other countries back in 2017. The NotPetya attack is believed to be the most destructive cyberattack in history, with more than $10 billion in total damages. Due to the shared characteristics of the newly discovered samples with both Petya and NotPetya, we named this new malware HybridPetya,\u201d says ESET researcher Martin Smol\u00e1r, who made the discovery.<\/p>\n<p align=\"justify\">The algorithm used to generate the victim\u2019s personal installation key, unlike in the original NotPetya, allows the malware operator to reconstruct the decryption key from the victim\u2019s personal installation keys. Thus, HybridPetya remains viable as regular ransomware \u2013 more like Petya. Additionally, HybridPetya is also capable of compromising modern UEFI-based systems by installing a malicious EFI application to the EFI System Partition. The deployed UEFI application is then responsible for encryption of the NTFS-related Master File Table (MFT) file \u2013 an important metadata file containing information about all the files on the NTFS-formatted partition.<\/p>\n<p align=\"justify\">\u201cAfter a bit more digging, we discovered something even more interesting on VirusTotal: an archive containing the whole EFI System Partition contents, including a very similar HybridPetya UEFI application, but this time bundled in a specially formatted cloak.dat file, vulnerable to CVE-2024-7344 \u2013 the UEFI Secure Boot bypass vulnerability that our team disclosed in early 2025,\u201d adds Smol\u00e1r. ESET publications from January 2025 purposely refrained from detailing the exploitation; thus, the malware author probably reconstructed the correct cloak.dat file format based on reverse engineering the vulnerable application on their own.<\/p>\n<p align=\"justify\">ESET telemetry shows no active use of HybridPetya in the wild yet; thus, HybridPetya may just be a proof of concept developed by a security researcher or an unknown threat actor. Furthermore, this malware does not exhibit the aggressive network propagation seen in the original NotPetya.<\/p>\n<p align=\"justify\">For a more detailed analysis and technical breakdown of HybridPetya, check out the latest ESET Research blogpost <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=PbYc9t5YHQvqBmU1nvzEMWFDioSyk55ySL49ToUGe699gMVojBte0qPEk4-WULWUB3ff-ffNx7CYDy_X6dEh6QPcWJEup_E3UijsCw1iEqrzxl_aJyLQDQ1DEa6eaB09iGLQWt8jE1--bHgydYfCg5H6VjPGIlZLxRHe7jfyG5aNqWo9TIBMjrqZBxkvcmZD9i5ytbYCX6I6nDnw2ZR14R6i5mSrUATuhnuACdl1PMqsL88KiqBHxcZAIeL6fx65FEMMoe9XHeghBF1wu8K2UqEqyVpBXYsoYUVAnn7KoTc=\" rel=\"nofollow noopener\" target=\"_blank\" title=\"Introducing HybridPetya: Petya\/NotPetya copycat with UEFI Secure Boot bypass\">Introducing HybridPetya: Petya\/NotPetya copycat with UEFI Secure Boot bypass<\/a> on WeLiveSecurity.com. Make sure to follow ESET Research on <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=bhjvfPSMY7bN9njROBrVUB9AD5a3Wpyeo_-jAYcab2KX2HBlkn0s5IF0W0Ptn98jFiK0cbjVa0fK6NQPcG65b1DTTn2s-pswAjMd28mPUCck_UUEb50MUwCexNLi3ghQ\" rel=\"nofollow noopener\" target=\"_blank\" title=\"Twitter (today known as X)\">Twitter (today known as X)<\/a>, <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=KtRmk4xm00Bp6oMyYNrV_4kvMjee4UG7GO7K5kIOLAG9nGcYiKBCqWwNlBuCy3JKpy_38-vAaUECyG2s89yhQ_jUxXSAniBQrgyjE7zkP97iEkpdSe11wunblpYKGlWE\" rel=\"nofollow noopener\" target=\"_blank\" title=\"BlueSky\">BlueSky<\/a>, and <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=rd69kgjAMIJrrTv0HizmrQ-Y265h34n_gds6ygddo_pC-Ig9cCtT3jFEoUXP35Ca2248ELo8MR-6D9a386qF_xlyEt-BlbxeUtlude4PmLk=\" rel=\"nofollow noopener\" target=\"_blank\" title=\"Mastodon\">Mastodon<\/a> for the latest news from ESET Research.<\/p>\n<p align=\"justify\">About ESET<br \/>ESET\u00ae provides cutting-edge cybersecurity to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown\u2014 securing businesses, critical infrastructure, and individuals. Whether it\u2019s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24\/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&amp;D centers and a strong global partner network. For more information, visit <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=BN3BzmLPWq4PrEQeAR1is-jVuP_qLrSgt4giz02v26iZyY5YI29qTRfEcE2uzTx0y6KPm1ntTVHc-z-uWpuYrw==\" rel=\"nofollow noopener\" target=\"_blank\" title=\"www.eset.com\">www.eset.com<\/a> or follow our <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=M8eFBSdK12tbH-_w_RUJ6nGGPTPk8PqwGN6NNHl4f94PGyQGWOT66TlingvWXudm-WdIoqrVbQjtZ4E9b8emjpdZ8xMoDVBqHXVcdoMbr1-0L1sLm9RMacPbdA7DuOa8\" rel=\"nofollow noopener\" target=\"_blank\" title=\"social media, podcasts and blogs\">social media, podcasts and blogs<\/a>.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.newsbeep.com\/ie\/wp-content\/uploads\/2025\/09\/ESET-LLC.png\" referrerpolicy=\"no-referrer-when-downgrade\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"ESET Research has discovered new ransomware samples, which it has named HybridPetya, resembling the infamous Petya\/NotPetya malware. They&hellip;\n","protected":false},"author":2,"featured_media":17921,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[16288,3312,16284,16286,61,60,5141,16287,80,16289,16285,16290],"class_list":{"0":"post-17920","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-bootkit","9":"tag-cybersecurity","10":"tag-eset","11":"tag-hybridpetya","12":"tag-ie","13":"tag-ireland","14":"tag-llc","15":"tag-ransomware","16":"tag-technology","17":"tag-telemetry","18":"tag-uefi","19":"tag-virustotal"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/17920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=17920"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/17920\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/17921"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=17920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=17920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=17920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}