New HybridPetya Ransomware Bypasses UEFI Secure Boot Protection | Black Hat Ethical Hacking



Execution Logic

Once launched, HybridPetya checks if the target system uses UEFI with GPT partitioning. If confirmed, it drops multiple files into the EFI partition, including:

  • \EFI\Microsoft\Boot\config (encryption keys and victim ID)
  • \EFI\Microsoft\Boot\verify (decryption validation)
  • \EFI\Microsoft\Boot\counter (encryption progress tracker)
  • \EFI\Microsoft\Boot\bootmgfw.efi.old (backup of original bootloader)
  • \EFI\Microsoft\Boot\cloak.dat (XORed bootkit for bypass variant)

The ransomware replaces the original bootloader with the vulnerable reloader.efi and removes \EFI\Boot\bootx64.efi.

Execution logic
Source: ESET

Victims are then forced into a reboot, triggering encryption of MFT clusters using Salsa20, while a fake CHKDSK screen hides the process.

Fake CHKDSK messageFake CHKDSK message
Source: ESET


Ransom Demand

After encryption completes, the system reboots again, and victims are shown a ransom note demanding $1,000 in Bitcoin.

The note offers a 32-character key that can be entered to:

  • Restore the original bootloader
  • Decrypt encrypted clusters
  • Reboot the system back to normal operation

Unlike NotPetya, which offered no recovery, HybridPetya includes a functional decryption mechanism, suggesting it is financially motivated.

HybridPetya's ransom noteHybridPetya’s ransom note
Source: ESET


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *