• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Petya/NotPetya copycat with UEFI Safe Boot bypass

Admin by Admin
September 15, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


ESET Analysis has found HybridPetya, on the VirusTotal pattern sharing platform. It’s a copycat of the notorious Petya/NotPetya malware, including the potential of compromising UEFI-based techniques and weaponizing CVE‑2024‑7344 to bypass UEFI Safe Boot on outdated techniques.

Key factors of this blogpost:

  • New ransomware samples, which we named HybridPetya, resembling the notorious Petya/NotPetya malware, have been uploaded to VirusTotal in February 2025.
  • HybridPetya encrypts the Grasp File Desk, which comprises vital metadata about all of the recordsdata on NTFS-formatted partitions.
  • Not like the unique Petya/NotPetya, HybridPetya can compromise trendy UEFI-based techniques by putting in a malicious EFI utility onto the EFI System Partition.
  • One of many analyzed HybridPetya variants exploits CVE‑2024‑7344 to bypass UEFI Safe Boot on outdated techniques, leveraging a specifically crafted cloak.dat file.
  • ESET telemetry reveals no indicators of HybridPetya getting used within the wild but; this malware doesn’t exhibit the aggressive community propagation seen within the unique NotPetya.

Overview

Late in July 2025, we encountered suspicious ransomware samples, uploaded to VirusTotal from Poland, below numerous filenames, together with notpetyanew.exe and different comparable ones, suggesting a reference to the infamously damaging malware that struck Ukraine and lots of different international locations again in 2017. The NotPetya assault is believed to be probably the most damaging cyberattack in historical past, with greater than $10 billion in complete damages. Regardless of NotPetya’s similarity to the Petya ransomware, first found in March 2016, NotPetya’s goal was pure destruction, as encryption key restoration from the sufferer’s private set up key was not potential. Due to the shared traits of the at the moment found samples with each Petya and NotPetya, we named the brand new discovery HybridPetya.

Whereas ESET telemetry reveals no energetic use of HybridPetya within the wild, one vital element in these samples nonetheless caught our consideration – in contrast to the unique NotPetya (and Petya ransomware as effectively), HybridPetya can be able to compromising trendy UEFI-based techniques by putting in a malicious EFI utility to the EFI System Partition. The deployed UEFI utility is then accountable for encryption of the NTFS-related Grasp File Desk (MFT) file – an vital metadata file containing details about all of the recordsdata on the NTFS-formatted partition.

After a bit extra digging, we found one thing much more fascinating on VirusTotal: an archive containing the entire EFI System Partition contents, together with a really comparable HybridPetya UEFI utility, however this time bundled in a specifically formatted cloak.dat file, susceptible to CVE‑2024‑7344 – the UEFI Safe Boot bypass vulnerability – that our staff disclosed in early 2025.

Apparently, regardless of the filenames on VirusTotal and the format of the ransom observe within the present samples suggesting that they is perhaps associated to NotPetya, the algorithm used for the era of the sufferer’s private set up key, in contrast to within the unique NotPetya, permits the malware operator to reconstruct the decryption key from the sufferer’s private set up keys. Thus, HybridPetya can function common ransomware (extra like Petya), slightly than being solely damaging like NotPetya.

Apparently, on September 9th, 2025, @hasherezade revealed a put up concerning the existence of a UEFI Petya PoC, with a video demonstrating execution of the malware with UEFI Safe Boot enabled. Though the pattern from the video is clearly totally different from the one offered on this blogpost (displaying the everyday Petya ASCII artwork cranium, which isn’t current within the samples we found), we suspect that there is perhaps some relationship between the 2 instances, and that HybridPetya may additionally be only a proof of idea developed by a safety researcher or an unknown menace actor.

On this blogpost, we concentrate on the technical evaluation of HybridPetya.

HybridPetya technical evaluation

On this part, we offer a technical evaluation of HybridPetya’s parts: the bootkit and its installer. We additionally individually dissect a model of HybridPetya that’s able to bypassing UEFI Safe Boot by exploiting CVE-2024-7344. Observe that HybridPetya helps each legacy and UEFI based mostly techniques – on this blogpost, we’ll concentrate on the UEFI half.

Apparently, the code accountable for producing the victims’ private set up keys appears to be impressed by the RedPetyaOpenSSL PoC. We’re conscious of not less than one different UEFI-compatible PoC rewrite of NotPetya, dubbed NotPetyaAgain, which is written in Rust; nonetheless, that code is unrelated to HybridPetya.

UEFI bootkit

We obtained two distinct variations of the UEFI bootkit element, each very comparable however with sure variations. When executed, the bootkit first hundreds its configuration from the EFIMicrosoftBootconfig file, and checks the encryption flag indicating the present encryption standing – identical as the unique Petya/NotPetya samples, the encryption flag can have one of many following values:

  • 0 – prepared for encryption,
  • 1 – already encrypted, or
  • 2 – ransom paid, disk decrypted.

It continues with execution based mostly on the encryption standing flag, as proven in Determine 1.

Figure 1. Overview HybridPetya execution logic
Determine 1. Overview of HybridPetya’s execution logic

Disk encryption

If the worth of the encryption flag is 0, the bootkit extracts the 32-byte-long Salsa20 encryption key and 8-byte-long nonce from the configuration knowledge, and subsequently rewrites the configuration file, now with the encryption key zeroed and the encryption flag set to 1. It continues with encryption of the EFIMicrosoftBootverify file with the Salsa20 encryption algorithm utilizing the important thing and nonce from the configuration. Then, earlier than continuing to its predominant performance – disk encryption – it creates the file EFIMicrosoftBootcounter on the EFI System Partition; the aim of this file is defined later.

The disk encryption course of begins with identification of all NTFS-formatted partitions. As proven in Determine 2, the pattern does so by getting the record of handles for linked storage gadgets, figuring out the person partitions by checking that EFI_BLOCK_IO_MEDIA->LogicalPartition is TRUE, and eventually verifying whether or not the partition is NTFS formatted by evaluating the primary 4 bytes of the information current within the first partition’s sector with the NTFS signature NTFS.

Figure 2. Hex-Rays decompiled code for NTFS partitions identification
Determine 2. Hex-Rays decompiled code for NTFS partition identification

As soon as the NTFS partitions have been recognized, the bootkit continues with encryption of the Grasp File Desk (MFT) file, the important metadata file containing details about different recordsdata and the situation of their knowledge on the NTFS-formatted partition. As proven in Determine 3, through the encryption, the bootkit rewrites the contents of the EFIMicrosoftBootcounter file with the variety of already encrypted disk clusters, and updates the pretend CHKDSK message displayed on the sufferer’s display screen (proven in Determine 4), with the details about the present encryption standing (although, based mostly on the message, the sufferer might consider that the disk is being checked for errors, not being encrypted).

Figure 3. Hex-Rays decompiled code
Determine 3. Hex-Rays decompiled code: MFT encryption
Figure 4. Fake CHKDSK message shown by HybridPetya
Determine 4. Pretend CHKDSK message proven by HybridPetya throughout disk encryption (similar with NotPetya and Petya)

When achieved with the encryption, the bootkit reboots the machine.

Disk decryption

If the bootkit detects that the disk is already encrypted, which means that the worth of the encryption flag from the configuration file is 1, it reveals the ransom observe proven in Determine 5 or Determine 6 (relying on the bootkit model), and asks the sufferer to enter the decryption key. Observe that whereas the HybridPetya ransom observe has the identical format as that of the unique NotPetya (proven in Determine 7), the ransom quantity, bitcoin tackle, and the operator’s electronic mail tackle are totally different. Additionally, the model deployed with the UEFI Safe Boot bypass makes use of a special contact electronic mail tackle (wowsmith999999@proton[.]me) than the model deployed by the obtained installers (wowsmith1234567@proton[.]me). It’s price mentioning that the bitcoin tackle is identical in each variations.

Figure 5. Ransom note from the bootkit
Determine 5. Ransom observe from the bootkit put in by the installers with out the UEFI Safe Boot bypass
Figure 6. Ransom note
Determine 6. Ransom observe displayed by the bootkit model deployed by exploiting CVE-2024-7344
Figure 7. Original NotPetya ransom note.
Determine 7. Authentic NotPetya ransom observe

When a key with the proper size – 32 characters – is entered and confirmed by the sufferer urgent Enter, the bootkit proceeds to verification of the important thing. As depicted in Determine 8, key validity is established by making an attempt to decrypt the aforementioned EFIMicrosoftBootverify file with the provided key, and checking whether or not the plaintext comprises solely bytes with worth 0x07. Observe that the bootkit variant deployed by way of the UEFI Safe Boot bypass hashes the provided key with an algorithm in all probability based mostly on SPONGENT-256/256/16, utilizing that hash worth because the decryption key, whereas the bootkit deployed by the obtained installers takes the consumer’s enter as is.

Figure 8. Hex-Rays decompiled code disk-decryption key validity verification
Determine 8. Hex-Rays decompiled code: disk-decryption key validity verification

If the proper secret is entered, the bootkit updates the configuration file with the encryption flag worth set to 2 and in addition fills within the decryption key. Then it reads the contents of the EFIMicrosoftBootcounter file (containing the variety of disk clusters beforehand encrypted) and proceeds with disk decryption. For the decryption, the bootkit proceeds with a really comparable course of to that of NTFS partition discovery and MFT decryption (the Salsa20 encryption and decryption course of is identical) as described within the Disk encryption part. The decryption stops when the variety of decrypted clusters is the same as the worth from the counter file. In the course of the strategy of MFT decryption, the bootkit reveals the present decryption course of standing, depicted in Determine 9, on the sufferer’s display screen.

Figure 9. Decryption status shown to a victim after entering a valid key
Determine 9. Decryption standing proven to a sufferer after getting into a sound key

Subsequent, the bootkit proceeds with recovering the legit bootloaders EFIMicrosoftBootbootmgfw.efi and EFIBootbootx64.efi from the backup file beforehand created through the set up course of: EFIMicrosoftBootbootmgfw.efi.outdated.

Lastly, after the decryption course of is completed and the legit bootloaders recovered, the bootkit prompts the sufferer to reboot the machine (Determine 10). If all the things went effectively, the machine ought to begin the working system efficiently after the reboot.

Figure 10. Prompt to reboot victim device after successful disk decryption
Determine 10. Immediate to reboot sufferer machine after profitable disk decryption

Deploying the UEFI bootkit element

On this part, we concentrate on the bootkit-installation performance of the found HybridPetya installers. Observe that the installers we have been capable of receive don’t take UEFI Safe Boot under consideration. Nevertheless, as defined within the CVE-2024-7344 exploitation part, there’s possible a variant with such an enchancment.

To resolve whether or not the system is UEFI based mostly, the installer retrieves the disk data (IOCTL_DISK_GET_DRIVE_LAYOUT_EX), checks whether or not the GPT partitioning scheme is used (PARTITION_STYLE_GPT), and walks via the partitions till it discovers the one with PARTITION_INFORMATION_GPT.PartitionType set to PARTITION_SYSTEM_GUID, which is the identifier of the EFI System Partition. After discovering the EFI System Partition, it continues:

  • Eradicating the fallback UEFI bootloader, saved in EFIBootBootx64.efi.
  • Dropping a disk-encryption-related configuration together with the encryption flag, to the EFIMicrosoftBootconfig file on the EFI System Partition; the encryption configuration comprises the Salsa20 encryption key, 8-byte nonce, and sufferer’s private set up key (base58-encoded knowledge).
  • Dropping an encryption-verification array consisting of 0x200 bytes with worth 0x07 to the EFIMicrosoftBootverify file on the EFI System Partition; this array is later encrypted by the bootkit element utilizing the identical Salsa20 key as used for disk encryption. The aim of this array is to confirm whether or not the sufferer entered a sound decryption key (by decrypting the array with the entered key, and verifying that the plaintext comprises an array of bytes with worth 0x07).
  • Making a backup of EFIMicrosoftBootbootmgfw.efi, the default bootloader for Home windows-based techniques, by copying it into EFIMicrosoftBootbootmgfw.efi.outdated.

When achieved, it triggers a system crash (Blue Display screen Of Dying, BSOD) through the use of the identical methodology that Petya did – invoking the NtRaiseHardError API with the ErrorStatus parameter set to 0xC0000350 (STATUS_HOST_DOWN) and the ResponseOption set to worth 6 (OptionShutdownSystem), leading to a system shutdown.

The abovementioned adjustments be certain that on techniques with Home windows set as the first OS, the bootkit binary will probably be executed as soon as the machine is powered on once more.

CVE-2024-7344 exploitation

On this part, we look at an archive that we found on VirusTotal that comprises a variant of the UEFI bootkit described within the UEFI bootkit part, however this time bundled in a specifically formatted cloak.dat file associated to CVE-2024-7344 – the UEFI Safe Boot bypass vulnerability that our staff publicly disclosed in early 2025.

A listing of the recordsdata current within the archive together with their contents means that this EFI System Partition was copied from a system already encrypted by this Petya/NotPetya copycat variant. Observe that we haven’t obtained the installer accountable for deploying this model with the UEFI Safe Boot bypass, however based mostly on the archive’s contents, that are proven in Determine 11, it will be fairly just like the method described within the earlier part. Particularly, the archive comprises:

  • EFIMicrosoftBootcounter, a file already containing a non-zero worth representing the variety of disk clusters beforehand encrypted by the bootkit,
  • EFIMicrosoftBootconfig, a file with the encryption flag worth set to 1, which means that the disk needs to be already encrypted and the bootkit ought to proceed with displaying the ransom observe,
  • EFIMicrosoftBootbootmgfw.efi.outdated, a file with the primary 0x400 bytes XORed with the worth 0x07,
  • EFIMicrosoftBootbootmgfw.efi, a legit, however susceptible (CVE‑2024‑7344) UEFI utility signed by Microsoft (revoked in Microsoft’s dbx since January 2025); on this part we’ll check with this file with its unique title reloader.efi, and
  • EFIMicrosoftBootcloak.dat, a specifically crafted file loadable via reloader.efi and containing the XORed bootkit binary.
Figure 11. Archive containing the CVE-2024-7344-exploiting version of the bootkit
Determine 11. Archive containing the CVE-2024-7344-exploiting model of the bootkit

As described in our report from January 2025, the exploit mechanism is sort of easy. The cloak.dat file comprises specifically formatted knowledge that comprises a UEFI utility. When the reloader.efi binary (deployed as bootmgfw.efi) is executed throughout boot, it searches for the presence of the cloak.dat file on the EFI System Partition, and hundreds the embedded UEFI utility from the file in a really unsafe approach, utterly ignoring any integrity checks, thus bypassing UEFI Safe Boot.

Observe that our blogpost from January 2025 didn’t clarify the exploitation in superb element; thus, the malware creator in all probability reconstructed the proper cloak.dat file format based mostly on reverse engineering the susceptible utility on their very own.

The vulnerability can’t be exploited on techniques with Microsoft’s January 2025 dbx replace utilized. For steering on tips on how to defend and confirm whether or not your system is uncovered to this vulnerability, test the Safety and Detection part of our January 2025 blogpost.

Conclusion

HybridPetya is now not less than the fourth publicly identified instance of an actual or proof-of-concept UEFI bootkit with UEFI Safe Boot bypass performance, becoming a member of BlackLotus (exploiting CVE‑2022‑21894), BootKitty (exploiting LogoFail), and the Hyper-V Backdoor PoC (exploiting CVE‑2020‑26200). This reveals that Safe Boot bypasses should not simply potential – they’re changing into extra widespread and enticing to each researchers and attackers.

Though HybridPetya is just not actively spreading, its technical capabilities – particularly MFT encryption, UEFI system compatibility, and Safe Boot bypass – make it noteworthy for future menace monitoring.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com.
ESET Analysis affords non-public APT intelligence studies and knowledge feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.

IoCs

A complete record of indicators of compromise (IoCs) and samples might be present in our GitHub repository.

Recordsdata

SHA-1 Filename Detection Description
BD35908D5A5E9F7E41A61B7AB598AB9A88DB723D bootmgfw.efi EFI/Diskcoder.A HybridPetya – UEFI bootkit element.
9DF922D00171AA3C31B75446D700EE567F8D787B N/A EFI/Diskcoder.A HybridPetya – UEFI bootkit element, extracted from cloak.dat.
9B0EE05FFFDA0B16CF9DAAC587CB92BB06D3981B N/A Win32/Injector.AJBK HybridPetya installer.
CDC8CB3D211589202B49A48618B0D90C4D8F86FD core.dll Win32/Filecoder.OSK HybridPetya installer.
D31F86BA572904192D7476CA376686E76E103D28 f20000.mbam_update.exe Win32/Filecoder.OSK HybridPetya installer.
A6EBFA062270A321241439E8DF72664CD54EA1BC improved_notpetyanew.exe Win32/Kryptik.BFRR HybridPetya installer.
C8E3F1BF0B67C83D2A6D9E594DE8067F0378E6C5 notpetya_new.exe Win32/Kryptik.BFRR HybridPetya installer.
C7C270F9D3AE80EC5E8926A3CD1FB5C9D208F1DC notpetyanew.exe Win32/Kryptik.BFRR HybridPetya installer.
3393A8C258239D6802553FD1CCE397E18FA285A1 notpetyanew_improved_final.exe Win32/Kryptik.BFRR HybridPetya installer.
98C3E659A903E74D2EE398464D3A5109E92BD9A9 bootmgfw.efi N/A UEFI utility susceptible to CVE-2024-7433.
D0BD283133A80B47137562F2AAAB740FA15E6441 cloak.dat EFI/Diskcoder.A Specifically formatted cloak.dat associated to CVE-2024-7433, comprises XORed HybridPetya UEFI bootkit element.

MITRE ATT&CK methods

This desk was constructed utilizing model 17 of the MITRE ATT&CK framework.

Tactic ID Identify Description
Useful resource Improvement T1587.001 Develop Capabilities: Malware HybridPetya is new ransomware with UEFI compatibility and a UEFI bootkit element developed by unknown authors.
T1587.004 Develop Capabilities: Exploits HybridPetya’s authors developed an exploit for the CVE‑2024‑7344 UEFI Safe Boot bypass vulnerability.
Execution T1203 Exploitation for Shopper Execution HybridPetya exploits CVE‑2024‑7344 to execute an unsigned UEFI bootkit on outdated techniques with UEFI Safe Boot enabled.
T1106 Native API HybridPetya installers use undocumented native API NtRaiseHardError to trigger a system crash after the bootkit’s set up.
Persistence T1542.003 Pre-OS Boot: Bootkit HybridPetya persists utilizing the bootkit element. It helps each legacy and UEFI techniques.
T1574 Hijack Execution Stream HybridPetya installers hijack the common system boot course of by changing the legit Home windows bootloader with a malicious one.
Privilege Escalation T1068 Exploitation for Privilege Escalation HybridPetya exploits CVE‑2024‑7344 to bypass UEFI Safe Boot and execute the malicious UEFI bootkit with excessive privileges throughout bootup.
Protection Evasion T1211 Exploitation for Protection Evasion HybridPetya exploits CVE‑2024‑7344 to bypass UEFI Safe Boot.
T1620 Reflective Code Loading HybridPetya installers use the reflective DLL loading approach.
T1036 Masquerading The HybridPetya bootkit shows pretend CHKDSK messages on the display screen throughout disk encryption to masks its malicious exercise.
Affect T1486 Information Encrypted for Affect The HybridPetya installer encrypts recordsdata with specified extensions and the bootkit element encrypts MFT file on every NTFS-formatted partition.
T1529 System Shutdown/Reboot HybridPetya reboots the machine after MFT encryption.

Tags: BootBypassCopycatPetyaNotPetyasecureUEFI
Admin

Admin

Next Post
Get Prepared for the Vacation Tech Splurge: US Adults Anticipated to Spend $931 on Gadgets, CNET Survey Finds

Get Prepared for the Vacation Tech Splurge: US Adults Anticipated to Spend $931 on Gadgets, CNET Survey Finds

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Meta and Harvard Researchers Introduce the Confucius Code Agent (CCA): A Software program Engineering Agent that may Function at Massive-Scale Codebases

Meta and Harvard Researchers Introduce the Confucius Code Agent (CCA): A Software program Engineering Agent that may Function at Massive-Scale Codebases

January 10, 2026
A brand new method to enhance the capabilities of enormous language fashions | MIT Information

A brand new method to enhance the capabilities of enormous language fashions | MIT Information

December 21, 2025

Trending.

The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

March 26, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Home windows Malware Makes use of Pulsar RAT for Stay Chats Whereas Stealing Knowledge – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

Home windows Malware Makes use of Pulsar RAT for Stay Chats Whereas Stealing Knowledge – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

February 1, 2026
AI brokers now have their very own Reddit-style social community, and it is getting bizarre quick

AI brokers now have their very own Reddit-style social community, and it is getting bizarre quick

February 1, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved