September 14, 2025
New HybridPetya virus bypasses Uefi Secure Boot in Windows and encrypts hard drives thumbnail
Ukraine News Today

New HybridPetya virus bypasses Uefi Secure Boot in Windows and encrypts hard drives

Vlad Cherevko I have been interested in all kinds of electronics and technologies since the early 2000s. I like to play computer games and understand the work of different gadgets. I regularly monitor the news of the technology in the world and write materials about it.

ESET cybersecurity experts have found a new sample of harmful software called HybridPetya, capable of bypassing the UEFI Secure Boot protection mechanism in Windows. Notebookcheck writes about it.

UEFI Secure Boot usually checks digital certificates of programs that are loaded from the drive when you turn on the computer and blocks the start of an unauthorized or malicious code.

HybridPetya determines whether the UEFI contaminated device with GPT marking, and if confirmed by Secure Boot. The pest then changes, deletes or adds to the boot section, which allows you to block access to the rest of the data on the disk and encrypt them.

After activation, the program displays a file encryption message and requires to pay $ 1000 in bitcoins. The text indicates the cryptoamant address for transferring funds, as well as the instructions to send your own wallet address and generated the installation key to the Protonmail e -mail to obtain the decryption key.

HybridPetya Redemption Notification HybridPetya Redemption Notification

ESET Security

As of September 12, 2025, ESET did not record real attacks using HybridPetya. Experts suggest that the sample may be a prototype or be at the test stage before spreading.

The vulnerability used by this pest was eliminated in January Windows (Patch Tuesday, January 2025). Therefore, users who have installed up -to -date updates are protected from this threat.

HybridPetya is currently unknown at this time, other operating systems, including MacOS or Linux.

”, – WRITE: mezha.media

Vlad Cherevko I have been interested in all kinds of electronics and technologies since the early 2000s. I like to play computer games and understand the work of different gadgets. I regularly monitor the news of the technology in the world and write materials about it.

ESET cybersecurity experts have found a new sample of harmful software called HybridPetya, capable of bypassing the UEFI Secure Boot protection mechanism in Windows. Notebookcheck writes about it.

UEFI Secure Boot usually checks digital certificates of programs that are loaded from the drive when you turn on the computer and blocks the start of an unauthorized or malicious code.

HybridPetya determines whether the UEFI contaminated device with GPT marking, and if confirmed by Secure Boot. The pest then changes, deletes or adds to the boot section, which allows you to block access to the rest of the data on the disk and encrypt them.

After activation, the program displays a file encryption message and requires to pay $ 1000 in bitcoins. The text indicates the cryptoamant address for transferring funds, as well as the instructions to send your own wallet address and generated the installation key to the Protonmail e -mail to obtain the decryption key.

HybridPetya Redemption Notification HybridPetya Redemption Notification

ESET Security

As of September 12, 2025, ESET did not record real attacks using HybridPetya. Experts suggest that the sample may be a prototype or be at the test stage before spreading.

The vulnerability used by this pest was eliminated in January Windows (Patch Tuesday, January 2025). Therefore, users who have installed up -to -date updates are protected from this threat.

HybridPetya is currently unknown at this time, other operating systems, including MacOS or Linux.

Related posts

World Athletics Championship: Where to look in Ukraine

radiosvoboda

Hungary and Slovakia want to relieve sanctions from six Russian businessmen

radiosvoboda

In the US, a court was started over a man charged with a second attempt attempted on Trump

radiosvoboda

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More