← Back to BrewedIntel
malwarehighBootkitUEFI MalwareHybridPetyaNotPetyaPetya

Sep 16, 2025 • ESET WeLiveSecurity

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya represents a significant evolution in bootkit malware, distinguished as the fourth known instance capable of bypassing UEFI Secure Boot...

Source
ESET WeLiveSecurity
Category
malware
Severity
high

Executive Summary

HybridPetya represents a significant evolution in bootkit malware, distinguished as the fourth known instance capable of bypassing UEFI Secure Boot protections. Building upon the legacy of Petya and NotPetya, this malware introduces new functionalities that threaten system integrity at the firmware level. The ability to circumvent Secure Boot allows persistent access that survives operating system reinstalls, posing a critical risk to enterprise security architectures. While the article notes it may be a proof-of-concept, the technical capability demonstrates a tangible threat vector for advanced persistent threats. Organizations must prioritize firmware security, ensure Secure Boot is properly configured and monitored, and apply vendor patches to mitigate UEFI vulnerabilities. Incident response teams should update detection rules to identify bootkit behaviors. The emergence of HybridPetya underscores the growing sophistication of malware targeting pre-boot environments, requiring heightened vigilance and robust endpoint protection strategies to prevent compromise.

Summary

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality

Published Analysis

HybridPetya represents a significant evolution in bootkit malware, distinguished as the fourth known instance capable of bypassing UEFI Secure Boot protections. Building upon the legacy of Petya and NotPetya, this malware introduces new functionalities that threaten system integrity at the firmware level. The ability to circumvent Secure Boot allows persistent access that survives operating system reinstalls, posing a critical risk to enterprise security architectures. While the article notes it may be a proof-of-concept, the technical capability demonstrates a tangible threat vector for advanced persistent threats. Organizations must prioritize firmware security, ensure Secure Boot is properly configured and monitored, and apply vendor patches to mitigate UEFI vulnerabilities. Incident response teams should update detection rules to identify bootkit behaviors. The emergence of HybridPetya underscores the growing sophistication of malware targeting pre-boot environments, requiring heightened vigilance and robust endpoint protection strategies to prevent compromise. HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality

Linked Entities

  • HybridPetya
  • NotPetya
  • Petya