ESET Research Uncovers HybridPetya Ransomware for UEFI Systems

Published:

spot_img

Unveiling HybridPetya: A New Threat in the Malware Landscape

Introduction to HybridPetya

ESET Research has recently unveiled a new type of malware termed HybridPetya, which has surfaced on the well-known malware scanning platform, VirusTotal. This bootkit and ransomware is modeled after the notorious Petya and NotPetya malware, but it brings additional capabilities, primarily targeting UEFI-based systems. Notably, it utilizes CVE-2024-7344 to bypass UEFI Secure Boot protections on older systems, a significant development in the realm of cybersecurity threats.

A Glimpse at the Historical Context

The emergence of HybridPetya bears a resemblance to previous cyberattacks, particularly the NotPetya attack that occurred in 2017. This incident is infamous for being one of the most destructive cyber operations in history, inflicting damages that exceeded $10 billion. “In late July 2025, we encountered ransomware samples under various names, including notpetyanew.exe. This similarity to past malware suggests a connection to the earlier, more destructive threats,” explains Martin Smolár, a researcher at ESET who played a pivotal role in the discovery.

Technical Insights into HybridPetya

Unlike its predecessor, NotPetya, which encrypted data rendering it nearly impossible to recover, HybridPetya utilizes a different algorithm for generating installation keys. This new method allows the malware operator to possibly reconstruct the decryption key from these personal keys, making it operate more like traditional ransomware.

HybridPetya also distinguishes itself by targeting modern UEFI-based systems. It achieves this by installing a malicious EFI application onto the EFI System Partition. This application specializes in encrypting the NTFS Master File Table (MFT), a crucial metadata file that holds details regarding all files stored on an NTFS-formatted partition. The ability to compromise UEFI systems is a notable evolution in malware strategies.

Investigating Further: The Role of CVE-2024-7344

During further analysis, the ESET team discovered something intriguing on VirusTotal. They encountered an archive containing an EFI System Partition that housed a similar HybridPetya UEFI application, cleverly wrapped in a specially formatted cloak.dat file. This file exploits the CVE-2024-7344 vulnerability, a UEFI Secure Boot bypass flaw that ESET disclosed earlier in 2025. “Our earlier publications were intentionally vague on the specifics of the exploitation,” Smolár adds. It appears that the malware author may have replicated the necessary cloak.dat file format by reverse engineering the vulnerable application independently.

Current State of HybridPetya in the Wild

Despite the alarming capabilities of HybridPetya, ESET telemetry indicates that the malware has yet to be actively deployed in the wild. This raises several questions: Is HybridPetya merely a proof of concept developed either by a security researcher or an unknown threat actor? There’s no indication of the aggressive network propagation techniques that characterized the original NotPetya, suggesting that the current incidence of HybridPetya may be limited.

Conclusion: Monitoring and Preparedness

As HybridPetya represents a sophisticated evolution of previous malware, its implications for cybersecurity cannot be understated. While it may not currently be causing widespread disruption, its potential capabilities underline the necessity for vigilant monitoring and robust defenses against emerging threats. Understanding the nuances of malware like HybridPetya is essential for maintaining cybersecurity preparedness in an ever-evolving digital landscape.

spot_img

Related articles

Recent articles

NSW Man Arrested for Mobile Phishing Scam

Man Charged in Mobile Phishing Scheme Targeting Telco Customers A man from the South Coast of New South Wales stands accused of orchestrating a mobile...

Mustang Panda Unleashes SnakeDisk USB Worm to Target Thailand with Yokai Backdoor

Discovering the Innovations of Mustang Panda's Cyber Threats In recent developments, the threat group known as Mustang Panda, which is believed to have ties to...

Devon Drug Dealer Sentenced as £1.3 Million in Cryptocurrency Seized

Major Cryptocurrency Seizure in Devon: The Case of Ryan Coleman Overview of the Investigation In a significant operation, Devon and Cornwall Police have seized £1.3 million...

Overlooking Hidden Risks Could Lead to Catastrophe

The Necessity of Comprehensive System Visibility in Cybersecurity As organizations strive to implement robust cybersecurity measures, John McLoughlin, CEO of J2 Software, emphasizes a crucial...