The latest ransomware outbreak “Petya” is attacking companies across the globe today, the new variants of ransomware are also known as Petwrap / Petya / NotPetya / Nyetya. Quite a number of companies in Europe and Asia are reporting affected.
From the initial analysis, same as last time ransomware outbreak “WannaCry”, this ransom uses multiple techniques to spread, including one which was addressed by a Windows vulnerability MS17-010 via SMBv1. it was also reported that the ransomware used phishing email to spread. once infected, the machine will spread via local network before it encrypts data on local machine.
Systems Affected
All versions of Windows Servers and Clients.
Impact
Petya ransomware modifies the master boot records (MBR) and encrypts the Master File Table (MFT) of infected Windows computers, making affected machines unusable.
Modify the MBR and encrypt MFT on victims’ computers.
Infected system will reboot after an hour. Since the MBR has been damaged, the system will display a ransom note instead of booting properly.
Data will be unrecoverable due to encrypted by ransomware.
Spread itself to other computers in the local network.
Until now, there is NO effective method to decrypt all the kidnapped files.
Actions Preventing Petya Attack
Firewall
Enable your firewalls as well as intrusion detection and prevention systems.
Ensure latest signature has been applied on IPS.
Proactively monitor and validate the incoming and outgoing traffic of the network.
Windows Client
Ensure PC has up-to-date Windows updates, especially MS17-010.
Ensure up-to-date anti-virus signatures from your anti-virus software such as Kaspersky or Windows Defender updated.
Backup your files regularly and keep them in a separate and safe place.
Do not open email/attachments from unknown/untrusted source
Ensure you have a “strong” system password
Windows Server
Same as Windows Client.
Block incoming traffic to Port 445 in Windows Firewall if no SMB service is needed.
Note: these are good security defense-in-depth recommendations for prevention of being infected, but these steps alone do not guarantee against infection.
As a Victim:
Since Petya will start data encryption after system reboot, if user found their Windows hang suddenly and reboot (like the screen below), they should:
Turn off the computer IMMEDIATELY once the Windows Logo appears. Otherwise, the encryption process will be started.
Then, use the Live CD to boot the system, or unplug the hard disk and connect it to other computer for cleanup/create Kill-Switch and data backup.
DO NOT respond to any kidnapper by attempting payment and instead to report the incident to ITSC and the Police.
Note : Once the encryption process is completed, the data will be unrecoverable.
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.