New HybridPetya ransomware can bypass UEFI Secure Boot

Discussion in 'malware problems & news' started by stapp, Sep 13, 2025.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    29,243
    Location:
    UK
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,719
    Location:
    U.S.A. (South)
    Calling on @cruelsister - She is examined these types before.
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,516
    Location:
    The Netherlands
    What they also don't explain, is if you can stop these bootkits from installing, by blocking access to the MBR and by blocking driver installation?
     
  4. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,329
    Location:
    Member state of European Union
    Video shows that installation is done by simply copying file to EFI system partition and rebooting. So if you don't want to get infected by this UEFI Bootkit, you should not give malware access to EFI system partition nor copy this file yourself to EFI system partition.
    I'm not Windows expert, but I can strongly suspect that Windows standard user account does not have read-write access to this partition by default or it is not mounted by default at all.
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,671
    Location:
    U.S.A.
    Last edited: Sep 14, 2025
  6. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,719
    Location:
    U.S.A. (South)
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,516
    Location:
    The Netherlands
    OK I see, thanks. I remember that the Petya ransomware tried to modify the MBR, but this bootkit attack is different.

    In other words, you need to block access to the EFI system partition. I believe SpySpelter 12 is capable of blocking access to boot data. And if you read the article, you can see that these bootkits often try to load a driver, this should still be detectable.

    https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.