“

Vlad Cherevko I have been interested in all kinds of electronics and technologies since the early 2000s. I like to play computer games and understand the work of different gadgets. I regularly monitor the news of the technology in the world and write materials about it.
UEFI Secure Boot usually checks digital certificates of programs that are loaded from the drive when you turn on the computer and blocks the start of an unauthorized or malicious code.
HybridPetya determines whether the UEFI contaminated device with GPT marking, and if confirmed by Secure Boot. The pest then changes, deletes or adds to the boot section, which allows you to block access to the rest of the data on the disk and encrypt them.
After activation, the program displays a file encryption message and requires to pay $ 1000 in bitcoins. The text indicates the cryptoamant address for transferring funds, as well as the instructions to send your own wallet address and generated the installation key to the Protonmail e -mail to obtain the decryption key.

ESET Security
As of September 12, 2025, ESET did not record real attacks using HybridPetya. Experts suggest that the sample may be a prototype or be at the test stage before spreading.
The vulnerability used by this pest was eliminated in January Windows (Patch Tuesday, January 2025). Therefore, users who have installed up -to -date updates are protected from this threat.
HybridPetya is currently unknown at this time, other operating systems, including MacOS or Linux.
”, – WRITE: mezha.media

Vlad Cherevko I have been interested in all kinds of electronics and technologies since the early 2000s. I like to play computer games and understand the work of different gadgets. I regularly monitor the news of the technology in the world and write materials about it.
UEFI Secure Boot usually checks digital certificates of programs that are loaded from the drive when you turn on the computer and blocks the start of an unauthorized or malicious code.
HybridPetya determines whether the UEFI contaminated device with GPT marking, and if confirmed by Secure Boot. The pest then changes, deletes or adds to the boot section, which allows you to block access to the rest of the data on the disk and encrypt them.
After activation, the program displays a file encryption message and requires to pay $ 1000 in bitcoins. The text indicates the cryptoamant address for transferring funds, as well as the instructions to send your own wallet address and generated the installation key to the Protonmail e -mail to obtain the decryption key.

ESET Security
As of September 12, 2025, ESET did not record real attacks using HybridPetya. Experts suggest that the sample may be a prototype or be at the test stage before spreading.
The vulnerability used by this pest was eliminated in January Windows (Patch Tuesday, January 2025). Therefore, users who have installed up -to -date updates are protected from this threat.
HybridPetya is currently unknown at this time, other operating systems, including MacOS or Linux.