HybridPetya Ransomware Dodges UEFI Secure Boot
HybridPetya ransomware exploits a patched UEFI vulnerability to encrypt critical system metadata, posing a significant threat to unpatched Windows systems despite no active use detected yet.
10 Articles
10 Articles


HybridPetya: More proof that Secure Boot bypasses are not just an urban legend
Although it hasn't been seen in the wild yet A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads. . . .
New HybridPetya Ransomware Can Bypass UEFI Secure Boot - Cybernoz - Cybersecurity News
A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on the EFI System Partition. HybridPetya appears inspired by the destructive Petya/NotPetya malware that encrypted computers and prevented Windows from booting in attacks in 2016 and 2017 but did not provide a recovery option. Researchers at cybersecurity company ESET found a sample of HybridPetya on VirusTotal. T…
HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot - Help Net Security
ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware, augmented with the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems. The sample was uploaded from Poland to the malware-scanning platform VirusTotal, and ESET telemetry shows no signs of the malware being used in the wild yet. About HybridPe…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium