Skip to main content

Petya Ransomware: Another “WannaCry” Is Spreading Globally At A Massive Pace


petya ransomware
After WannaCry, a new ransomware threat named Petya is here to haunt your computers. It has already affected a large number of countries, including Ukraine, Russia, Poland, Germany, etc. The malware uses the NSA’s Eternal Blue exploit, which was leaked by
Shadow Brokers. The actors behind this threat are demanding $300 in bitcoins as ransom.
Some weeks ago, the WannaCry ransomware spread at a fast pace and infected hundreds and thousands of computers all across the world. Now, another ransomware is busy wrecking havoc. The new attack has taken Ukraine banks offline, resulting in the locking of computer systems in government offices. This ransomware attack has also affected the Chernobyl nuclear plant as well as Ukraine’s electricity supplier. It has also affected the Danish shipping company Maersk, Russian oil company Rosneft.
According to Kaspersky’s Costin Raiu, about 60% infections have been recorded in Ukraine, followed by 30% in Russia. The other countries affected by Petya are USA, Poland, Germany, UK, and France.


The Petya ransomware is associated with a Bitcoin wallet and demands $300 in Bitcoins for decryption. So far, according to Kaspersky, 7 payments have been associated with this ransomware. According to Symantec, the number of payments are 9.


What is Petya ransomware?

Kaspersky’s earlier report suggested that the new virus is a variant of the older Petya ransomware. However, the company later clarified that it’s an entirely new infection; that’s why they called it “NotPetya.”
Avira and Symantec have confirmed that Petya is using the Eternal Blue exploit, just like WannaCry. For those who don’t, Eternal Blue exploit targets Windows SMB file-sharing system and spreads quickly between different systems.


After infection, the affected systems show text: “If you see this text, then your files are no longer accessible because they are encrypted. Perhaps you are busy looking for a way to recover your files, but don’t waste your time. Nobody can recover your files without our decryption service.”
It should be noted that unlike traditional ransomware, Petya doesn’t encrypt all the files at once. It reboots the computers of victims and encrypts the hard drive’s complete Master File Table and makes the Master Boot Record unusable.
Here are some suggestions from security firm F-Secure to safeguard your computers. Apart from these, apply the MS17-010 patch that protected systems against EternalBlue.


Did you find this article on Petya ransomware useful? Don’t forget to share your views.

Comments

Follow Us

WHAT'S HOT

Best Gaming Linux Distros You Need To Try In 2017

Gaming on Linux scene is improving each year with better hardware support and increasing support from game developers. Apart from established distros like Ubuntu and Arch Linux, gamers are using gaming Linux distros like Steam OS to get a better experience. The other It’s gaming operating systems are Sparky Linux – Gameover

Shadow Brokers, Who Leaked WannaCry Exploit, Planning Release More Zero-Day Bugs

Shadow Brokers were the first to reveal the vulnerabilities that led to the release of the WannaCry virus and it looks like they are back with a bang. They are launching a subscription-based model where people will be sold zero-day exploits and hacking tools, at least to those who have opted to become their “loyal customer.” In a way, this can be marked as good news and terrible news at the same time.

Linksys’ New Router Uses “Killer Engine” To Stop Your Online Gaming Sessions From Lagging

If you’re fed up with laggy online gaming sessions, then, CES 2017 has bought something special for you. Linksys WRT32X is an AC3200 wireless router equipped with Rivet’s Killer

Hackers Behind NSA Data Leak Launch “$21,000 Zero-Day Dump” Subscription For Whitehats, Govts.

Credit: Oleg Andreev S hadow Brokers, the infamous hacker group that indirectly fueled the WannaCry Ransomeware, has arrived with a new marketing strategy for the bunch of exploits related to NSA and probably other organizations as well.