Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

      January 13, 2026

      Researchers Push Boundaries on AI That Actually Keeps Learning After Training

      January 13, 2026

      UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

      January 13, 2026

      Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

      January 13, 2026

      Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

      January 13, 2026
    • AI News
    TallwireTallwire
    Home»Tech»New HybridPetya Ransomware Exploits UEFI Vulnerability to Bypass Secure Boot
    Tech

    New HybridPetya Ransomware Exploits UEFI Vulnerability to Bypass Secure Boot

    Updated:December 25, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    New HybridPetya Ransomware Exploits UEFI Vulnerability to Bypass Secure Boot
    New HybridPetya Ransomware Exploits UEFI Vulnerability to Bypass Secure Boot
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity firm ESET has uncovered a new ransomware strain called HybridPetya, which blends traits of the infamous Petya/NotPetya malware with a newly discovered ability to bypass UEFI Secure Boot via the CVE-2024-7344 vulnerability. According to ESET, the malware was first spotted on VirusTotal in February 2025. Unlike its destructive predecessors, HybridPetya encrypts the Master File Table (MFT) on NTFS drives and installs a malicious EFI application into the EFI System Partition, enabling it to run early during system boot. The Secure Boot bypass is achieved via a specially-crafted file, cloak.dat, loaded through a vulnerable Microsoft-signed UEFI application (“reloader.efi” / “bootmgfw.efi”) in Howyar’s software, which ignores integrity checks. ESET notes there’s no evidence yet of widespread use in the wild—it may still be a proof-of-concept or early test strain—but its capabilities pose serious risk, especially for outdated or unpatched systems. 

    Sources: Hacker News, National Vulnerability Database, ESET

    Key Takeaways

    – HybridPetya represents a dangerous evolution in ransomware, combining the tactics of older strains (like Petya/NotPetya) with bootkit behavior and UEFI Secure Boot bypass.

    – The vulnerability CVE-2024-7344 allows execution of unsigned or unverified code from a cloak.dat file via a signed UEFI application, undermining Secure Boot protections on affected systems.

    – So far, no major attacks using HybridPetya have been confirmed, but the discovery underscores urgency for organizations to patch vulnerable UEFI components, revoke unsafe binaries, and ensure Secure Boot configurations are solid.

    In-Depth

    HybridPetya emerges at a precarious intersection of malware sophistication and exploitation of system firmware vulnerabilities. Discovered by ESET researchers in mid‐2025, this strain draws inspiration from Petya and NotPetya—widespread ransomware and wiper attacks that made headlines for their damage and high-profile targets—but adds a modern twist: the ability to compromise UEFI systems that employ Secure Boot protections. Secure Boot, intended to ensure that only trusted, signed code executes during system startup, is one of the foundational layers of modern OS security. By exploiting CVE-2024-7344—a vulnerability in a Microsoft-signed UEFI application (the “reloader.efi” component from Howyar contributed software)—HybridPetya manages to sneak a malicious UEFI bootkit into a machine earlier in the boot chain, circumventing Secure Boot’s integrity checks via a malformed cloak.dat file. This allows it to load with elevated privileges and encrypt key metadata structures such as the Master File Table (MFT) on NTFS partitions.

    The structure of HybridPetya reveals a two-part tool: an installer that places a malicious EFI application in the EFI System Partition, and a bootkit component that manages state (ready to encrypt, already encrypted, or decrypted) and tracks progress via files like verify, counter, and cloak.dat. The malware even displays a fake CHKDSK screen to fool users into thinking a disk check is underway while encryption proceeds in secret. One variant demands a ransom of US$1,000 in Bitcoin. Though ESET’s telemetry indicates no confirmed real-world deployment yet—suggesting HybridPetya might still be a proof-of-concept or in early testing—its capabilities are especially concerning, because many systems remain unpatched, or still trust the vulnerable UEFI components.

    The risk for organizations and individuals is clear: firmware-level vulnerabilities are harder to detect and remediate; Secure Boot bypasses enable early compromise before many security products can even load. To defend, institutions should promptly check for UEFI firmware updates, ensure that vulnerable binaries like reloader.efi have been replaced or revoked, audit Secure Boot configuration (including trust databases), and maintain backups of critical data. Even though we don’t have reports yet of HybridPetya in the wild at scale, its discovery is a warning shot: attackers continue to evolve, and legacy or poorly maintained systems increasingly represent weak links in the cybersecurity chain.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Evidence Shows South Atlantic Anomaly Morphing, Not Just Weakening
    Next Article New Law Lets Content Creators Keep Up to $25,000 in Tips Tax-Free—With Caveats

    Related Posts

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026

    UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

    January 13, 2026

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

    January 13, 2026

    Researchers Push Boundaries on AI That Actually Keeps Learning After Training

    January 13, 2026

    UK, Australia, Canada Clash With Elon Musk Over AI Safety, Truss Pushes Back

    January 13, 2026

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.