Tuesday, January 21, 2025
HomeRansomwareAnother Biggest Ransomware "Petya" Attacked and Perform Massive Breach in Large Number...

Another Biggest Ransomware “Petya” Attacked and Perform Massive Breach in Large Number of Countries Across the Globe – What to do if you are affected

Published on

SIEM as a Service

Follow Us on Google News

Again Ransomware Back to Form !!! A Ransomware called “Petya” Attack Large  Number of Countries across the Globe and it affecting a large number of banks, energy firms and other companies based in Russia, Ukraine, Spain, Britain, France,India,etc..

Few weeks Before Wannacry  Ransomware performed Massive breaches across the world and now petya Ransomware threatens the around the world and spread rapidly.

Also Read    New Ransomware, Attack Android Phones which Looks like Wannacry

This Ransomware attack Started in Ukraine First, Especially Ukraine’s government, banks, state power utility and Kiev’s airport and the metro system have infected by Petya very badly then its Spreading Across the World.

Petya Ransomware Displayed in  infected Machine that, “your files are no longer Accessible  and since your All the Files are encrypted asks  300$ Ransom amount from the Each Infected Computers”

According to  Independent, UK’s National Cyber Security Centre says, We’re aware of the global ransomware incident and are monitoring the situation closely.

Russian Super Market computer systems have fully infected by this Petya Ransomware.

Danish shipping company Maersk IT Systems Twitted that Multiple Sites and Business units are down by this Massive Petya Ransomware Cyber Attack.

Also Read    A Fileless Ransomware Called “SOREBRECT” Discovered with Code Injection Capability that Encrypts local and Network Share Files

How Does Petya Ransomware Attack

Petya Ransomware once entered into the Machine, First, in the attack the NTFS partitions contain MFT (Master File Tree) table and overwrites the MBR (Master Boot Record) with its Malicious code.

After “Master Boot Record” Over Ride by the Malicious code then it restricting access to the full system and its leads to unable to boot the systems and its finally shows the Ransom Notes that contain the information about the Payment and etc.

Petya Ransomware using email Spam in the form of Office documents to spread into the Network.

Petya Author provides contact details of wowsmith123456@posteo.net and asks for a payment of $300 in Bitcoin.

According to Symantec, Petya Using similar function of SMB work based on the NSA’s ETERNALBLUE exploit which is used by Wannacry Ransomware and this has been confirmed by another security firms Payload Security, Avira, Emsisoft, Bitdefender, Researchers.

Petya ransomware works it combines both a client-side attack (CVE-2017-0199) and a network-based threat (MS17-010)

A complete Indicator of Attacks (IOC) for Petya Ransomware Document  uploaded  in GitHub

According to virustotal Malware Scanning Engine Detected that 21 out of 61 AV vendors successfully indicated and updated Petya varients.

List of companies Infected by Petya

  1. Ukraine’s central bank, the National Bank of Ukraine.
  2. Ukrainian bank Oschadbank.
  3. Ukrainian delivery service company Nova Poshta.
  4. Russian state oil giant Rosneft.
  5. Kyivenergo, Kiev power company.
  6. Radiation monitoring system at Chernobyl.
  7. Website of Kiev’s Boryspil International Airport.
  8. Danish sea transport company Maersk.
  9. British advertising giant WPP.
  10. French industrial group Saint-Gobain.
  11. US pharmaceutical giant Merck.
  12. Spanish food giant Mondelez.
  13. Spanish global legal firm DLA Piper

What to do if you are affected?

The ransomware infects PCs and afterward sits tight for around an hour prior rebooting the machine. While the machine is rebooting, you can turn the PC off to keep the files from being encrypted and try and rescue the files from the machine, by @hackerfantastic.

If the system reboots with the ransom note, don’t pay for it, there is no way back to get the decryption key back as the Email address is shut down. You can for restoring the backup.

Security researcher Amit Serper found a kill switch “Temporary fix” for Petya Outbreak. The suggested method is to block the process that tries to open Harddisk0\\DR0 or “C:\Windows\perfc” with the write request.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced...

Ransomware Attack Forces UK Brit High School to Close Doors For Students

A ransomware attack has compelled UK Brit, a prominent British high school, to close...

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how...