Thursday, March 28, 2024

Another Biggest Ransomware “Petya” Attacked and Perform Massive Breach in Large Number of Countries Across the Globe – What to do if you are affected

Again Ransomware Back to Form !!! A Ransomware called “Petya” Attack Large  Number of Countries across the Globe and it affecting a large number of banks, energy firms and other companies based in Russia, Ukraine, Spain, Britain, France,India,etc..

Few weeks Before Wannacry  Ransomware performed Massive breaches across the world and now petya Ransomware threatens the around the world and spread rapidly.

Also Read    New Ransomware, Attack Android Phones which Looks like Wannacry

This Ransomware attack Started in Ukraine First, Especially Ukraine’s government, banks, state power utility and Kiev’s airport and the metro system have infected by Petya very badly then its Spreading Across the World.

Petya Ransomware Displayed in  infected Machine that, “your files are no longer Accessible  and since your All the Files are encrypted asks  300$ Ransom amount from the Each Infected Computers”

According to  Independent, UK’s National Cyber Security Centre says, We’re aware of the global ransomware incident and are monitoring the situation closely.

Russian Super Market computer systems have fully infected by this Petya Ransomware.

Danish shipping company Maersk IT Systems Twitted that Multiple Sites and Business units are down by this Massive Petya Ransomware Cyber Attack.

Also Read    A Fileless Ransomware Called “SOREBRECT” Discovered with Code Injection Capability that Encrypts local and Network Share Files

How Does Petya Ransomware Attack

Petya Ransomware once entered into the Machine, First, in the attack the NTFS partitions contain MFT (Master File Tree) table and overwrites the MBR (Master Boot Record) with its Malicious code.

After “Master Boot Record” Over Ride by the Malicious code then it restricting access to the full system and its leads to unable to boot the systems and its finally shows the Ransom Notes that contain the information about the Payment and etc.

Petya Ransomware using email Spam in the form of Office documents to spread into the Network.

Petya Author provides contact details of [email protected] and asks for a payment of $300 in Bitcoin.

According to Symantec, Petya Using similar function of SMB work based on the NSA’s ETERNALBLUE exploit which is used by Wannacry Ransomware and this has been confirmed by another security firms Payload Security, Avira, Emsisoft, Bitdefender, Researchers.

Petya ransomware works it combines both a client-side attack (CVE-2017-0199) and a network-based threat (MS17-010)

A complete Indicator of Attacks (IOC) for Petya Ransomware Document  uploaded  in GitHub

According to virustotal Malware Scanning Engine Detected that 21 out of 61 AV vendors successfully indicated and updated Petya varients.

List of companies Infected by Petya

  1. Ukraine’s central bank, the National Bank of Ukraine.
  2. Ukrainian bank Oschadbank.
  3. Ukrainian delivery service company Nova Poshta.
  4. Russian state oil giant Rosneft.
  5. Kyivenergo, Kiev power company.
  6. Radiation monitoring system at Chernobyl.
  7. Website of Kiev’s Boryspil International Airport.
  8. Danish sea transport company Maersk.
  9. British advertising giant WPP.
  10. French industrial group Saint-Gobain.
  11. US pharmaceutical giant Merck.
  12. Spanish food giant Mondelez.
  13. Spanish global legal firm DLA Piper

What to do if you are affected?

The ransomware infects PCs and afterward sits tight for around an hour prior rebooting the machine. While the machine is rebooting, you can turn the PC off to keep the files from being encrypted and try and rescue the files from the machine, by @hackerfantastic.

If the system reboots with the ransom note, don’t pay for it, there is no way back to get the decryption key back as the Email address is shut down. You can for restoring the backup.

Security researcher Amit Serper found a kill switch “Temporary fix” for Petya Outbreak. The suggested method is to block the process that tries to open Harddisk0\\DR0 or “C:\Windows\perfc” with the write request.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles