Skip to content

New HybridPetya Ransomware Targets UEFI Systems, Offers Decryption Option

HybridPetya's unique capabilities make it a threat to watch. Its targeting of UEFI systems and offer of decryption sets it apart from its infamous predecessor, NotPetya.

In this image in the center there is one dog who is sleeping, and in the background there are some...
In this image in the center there is one dog who is sleeping, and in the background there are some blankets.

New HybridPetya Ransomware Targets UEFI Systems, Offers Decryption Option

ESET researchers have discovered a new ransomware strain, HybridPetya, on VirusTotal. This malware echoes the infamous Petya/NotPetya, offering additional capabilities and targeting UEFI-based systems.

HybridPetya's origin remains unknown, with no specific organization identified as its developer. Despite not being actively spread, its technical prowess makes it a threat to monitor.

The malware can compromise UEFI-based systems and exploit CVE‐2024‐7344 to bypass UEFI Secure Boot on outdated systems. This is the fourth known UEFI bootkit with Secure Boot bypass, following BlackLotus, BootKitty, and the Hyper-V Backdoor PoC.

Unlike NotPetya, HybridPetya acts as true ransomware, allowing decryption. Its code for generating victims' personal installation keys seems inspired by the RedPetyaOpenSSL PoC.

HybridPetya's discovery is a reminder of the evolving threat landscape. While not currently spreading actively, its capabilities make it noteworthy for future threat monitoring. Organizations should ensure their systems are up-to-date to mitigate potential risks.

Read also:

Latest