Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

SB 243 to ChatGPT: Why it’s “uncool” to be cautious about AI

Facebook’s AI can now suggest edits to photos left on your phone

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Hybrid Petia Ransomware Bypass Eufi Secure Boot CVE-2024-7344 Exploit
Identity

New Hybrid Petia Ransomware Bypass Eufi Secure Boot CVE-2024-7344 Exploit

userBy userSeptember 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have discovered a new ransomware stock called Hybridpetya, similar to the infamous Petya/notpetya malware, but it also incorporates the ability to bypass the secure boot mechanism of a unified extended firmware interface (UEFI) system using the vulnerability disclosure possibilities disclosed earlier this year.

Slovakian Cybersecurity Company ESET said the sample was uploaded to the Virustotal platform in February 2025.

“Hybridpetya encrypts a master file table containing important metadata about all files on a partition in NTFS format,” said security researcher Martin Smolár. “Unlike the original Petya/notpetya, Hybridpetya can damage modern UEFI-based systems by installing malicious EFI applications on the EFI system partition.”

In other words, an expanded UEFI application is a central component that handles encrypting Master File Table (MFT) files containing metadata related to all files on a partition in NTFS format.

Audit and subsequent

HybridPetya comes with two main components: BootKit and the installer, the former being displayed in two different versions. BootKit, deployed by the installer, is primarily responsible for loading its configuration and checking its encryption status. It can have three different values ​​-

0- Preparation for encryption 1- Already encrypted, ransom paid, disk decryption

If you set the value to 0, set the flag to 1 and use the SALSA20 encryption algorithm to encrypt the key and non-CE specified in the configuration. Also, create a file called “\efi\microsoft\boot\counter” on the EFI system partition before starting the disk encryption process for all NTFS format partitions. This file is used to track disk clusters that are already encrypted.

Additionally, Bootkit updates the fake CHKDSK messages that appear on the victim’s screen with information about the current encryption status, but the victim is deceived to think that the system is repairing a disk error.

If the bootkit detects that the disk is already encrypted (i.e. the flag is set to 1), it will provide the victim with a ransom note and ask them to send $1,000 in Bitcoin to the specified wallet address (34unkksgzzvf5aybjkua2yyzw89zlwxu2). The wallet is currently empty, but received $183.32 between February and May 2025.

The Ransom Note screen also offers the option to enter the cheating key purchased from the operator after the victim has made the payment. The bootkit then verifies the key and attempts to decrypt the “efi\microsoft\boot\verify” file. If the correct key is entered, the flag value is set to 2 and the decryption step begins by reading the contents of the “\efi\microsoft\boot\counter” file.

“If the number of decrypted clusters is equal to the value from the counter file, the decryption will halt,” Smolár said. “During the MFT decoding process, the boot kit indicates the current decoding process status.”

During the decryption phase, bootkit also involves recovering legitimate bootloaders – “\efi\boot\bootx64.efi” and “\efi\microsoft\boot\bootmgfw.efi” – from a previously created backup. Once this step is complete, the victim will be asked to restart the Windows machine.

It is worth noting that a bootloader change initiated by the installer during deployment of UEFI BootKit components triggers a system crash (aka blue screen or BSOD) and ensures that the boot kit binary runs when the device is turned on.

Some variations of HybridPetya with added ESET have been found to misuse CVE ‑ 2024‑7344 (CVSS score: 6.7). Secure boot bypass.

This variant is also packed into a specially created file named “Cloak.dat” that can be loaded via reloader.efi and contains the Xored Bootkit binary. Microsoft then cancelled the old, vulnerable binaries as part of the patch for the Tuesday update for January 2025 update.

CIS Build Kit

“When the reloader.efi binary (expanded as bootmgfw.efi) is run during boot, it searches for the existence of the cloak.dat file in the EFI system partition, loads embedded UEFI applications from the file in a very irrelevant way, thus completely ignoring the integrity check.

Another aspect of Hybridpetya and Notpetya differs from the latter’s destructive capabilities, where newly identified artifacts allow threat actors to reconstruct decryption keys from victims’ personal facility keys.

Telemetry data from ESET show that there is no evidence that hybrid petia is being used in the wild. The cybersecurity company also pointed to recent discoveries of UEFI Petya’s proof of concept (POC) by security researcher Aleksandra “Hasherezade” Doniec, adding that there could be “some relationship between the two cases.” However, Hybridpetya doesn’t rule out the possibility that it is a POC either.

“HybridPetya is now at least the fourth publicly known example of a real or proof-of-concept UEFI bootkit with UEFI Secure Boot bypass functionality, joining BlackLotus (exploiting CVE‑2022‑21894), BootKitty (exploiting LogoFail), and the Hyper-V Backdoor PoC (exploiting CVE‑2020‑26200),” ESET said.

“This shows that not only is it possible to secure boot bypassing, it’s becoming more common and attractive to both researchers and attackers.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleScientists are developing a “full spectrum” 6G chip that can transfer data at 100 Gigabits 10,000 times faster than 5G.
Next Article We are entering a golden age of robotics startups.
user
  • Website

Related Posts

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

October 17, 2025

North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware

October 17, 2025

first and last line of defense

October 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

SB 243 to ChatGPT: Why it’s “uncool” to be cautious about AI

Facebook’s AI can now suggest edits to photos left on your phone

Analysis reveals slowing growth in ChatGPT mobile app downloads and daily usage

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.