Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems

Posted on September 12, 2025September 12, 2025 By CWS

In late July 2025, a collection of ransomware samples surfaced on VirusTotal below filenames referencing the infamous Petya and NotPetya assaults.

In contrast to its predecessors, this new menace—dubbed HybridPetya by ESET analysts—exhibited capabilities that prolonged past standard userland execution, immediately focusing on UEFI firmware on weak methods.

Via a specifically crafted cloak.dat archive and the exploitation of CVE-2024-7344, HybridPetya achieves a Safe Boot bypass on outdated platforms, permitting it to put in a malicious EFI utility into the EFI System Partition.

HybridPetya’s emergence marks a major evolution in bootkit design. The malware leverages a dual-component structure: a Home windows-based installer and an EFI bootkit.

Upon deployment, the installer locates the EFI System Partition, backs up official bootloaders, drops a Salsa20-encrypted configuration file (EFIMicrosoftBootconfig), and vegetation an encrypted verification array (EFIMicrosoftBootverify).

Overview of HybridPetya’s execution logic (Supply – Welivesecurity)

A triggered BSOD then forces the system to reload by means of the compromised bootloader, activating the EFI element at subsequent startup.

ESET researchers recognized that HybridPetya helps each legacy and UEFI methods; nonetheless, its true innovation lies in bypassing UEFI Safe Boot through the CVE-2024-7344 vulnerability.

In affected methods missing Microsoft’s January 2025 dbx replace, the malicious reloader.efi utility masquerades as a trusted Microsoft-signed binary.

When executed, it treats the accompanying cloak.dat file as a official payload, loading and executing the XOR-obfuscated EFI bootkit with out signature verification.

Hex-Rays decompiled code for NTFS partition identification (Supply – Welivesecurity)

This system mirrors the exploitation methodology detailed by ESET in earlier advisory studies, albeit weaponized inside a ransomware framework.

As soon as the EFI bootkit positive factors management through the pre-OS part, it reads its configuration and encryption flag.

If the flag is ready to “prepared for encryption,” the bootkit extracts the Salsa20 key and nonce, rewrites the configuration flag, and encrypts the NTFS Grasp File Desk (MFT) on all detected partitions.

Throughout this course of, a misleading CHKDSK-like progress message is exhibited to the sufferer, masking the malicious exercise.

Pretend CHKDSK message proven by HybridPetya throughout disk encryption (Supply – Welivesecurity)

After encryption completes, the system reboots, presenting a NotPetya-style ransom observe.

An infection Mechanism and Persistence

HybridPetya’s an infection mechanism hinges on the interaction between its Home windows installer and UEFI bootkit.

The installer begins by calling the native API NtRaiseHardError to induce a shutdown, guaranteeing the malicious bootloader will execute on restart:-

NtRaiseHardError(STATUS_HOST_DOWN, 0, 0, NULL, OptionShutdownSystem, &Response);

This crash trick ensures that the UEFI element runs below Safe Boot enforcement—or, within the case of outdated methods, bypassed Safe Boot.

Upon reboot, the EFI utility locates EFIMicrosoftBootconfig, examines the encryption flag, and branches into encryption or decryption logic.

For decryption, the sufferer should enter a 32-character key; the EFI bootkit then decrypts the confirm file and, if the plaintext matches a collection of 0x07 bytes, proceeds to revive the MFT and bonafide bootloaders from their .previous backups.

By embedding this persistence immediately into the firmware layer, HybridPetya ensures the ransomware can’t be eliminated by commonplace OS-level remediation instruments, elevating its resilience and framing it as a milestone in firmware-targeted threats.

Enhance your SOC and assist your staff defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Boot, Bypass, HybridPetya, Outdated, Secure, Systems, UEFI, Vulnerability, Weaponizing

Post navigation

Previous Post: DELMIA Factory Software Vulnerability Exploited in Attacks
Next Post: K2 Think AI Model Jailbroken Within Hours After The Release

Related Posts

Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials Cyber Security News
Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization Cyber Security News
Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Cyber Security News
Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News