New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit — [https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7UmnTCuSZ7XsUdB

new-hybridpetya-ransomware-bypasses-uefi-secure-boot-with-cve-2024-7344-exploit

What’s new: A new ransomware strain named HybridPetya has been discovered, which can bypass UEFI Secure Boot using the CVE-2024-7344 exploit. This ransomware encrypts the Master File Table (MFT) on NTFS partitions and installs a malicious EFI application on the EFI System Partition. It has been reported to demand a ransom of $1,000 in Bitcoin from victims.

Who’s affected

Organizations using UEFI-based systems are at risk, particularly those that have not patched the CVE-2024-7344 vulnerability, which has a CVSS score of 6.7. The ransomware has not yet been observed in the wild, but its capabilities pose a significant threat to system integrity.

What to do

  • Ensure that all systems are updated with the latest security patches, particularly those addressing CVE-2024-7344.
  • Implement robust backup solutions to protect against data loss from ransomware attacks.
  • Monitor for unusual activity on systems, especially related to UEFI and boot processes.
  • Educate users about the risks of ransomware and safe computing practices.

Sources