<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Petya Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/petya/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/petya/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Wed, 28 Jun 2017 20:44:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Petya Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/petya/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The latest Ransomware outbreak &#8211; Petya</title>
		<link>https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Jun 2017 09:24:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=775</guid>

					<description><![CDATA[<p>So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling this one Petya, as it seems very similar to the Petya Ransomware strain that has been around for over a year. Others are calling it&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">The latest Ransomware outbreak &#8211; Petya</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-full wp-image-782 alignleft" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1.png" alt="Petya / NotPetya / Petna" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen-300x300-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" />So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling this one Petya, as it seems very similar to the <a href="https://en.wikipedia.org/wiki/Petya_(malware)">Petya Ransomware</a> strain that has been around for over a year.<span id="more-775"></span></p>
<p>Others are calling it NotPetya or Petna, because it is essentially a new form of Ransomware. Whatever it&#8217;s called, doesn&#8217;t matter except to journalists who need sexy headlines. This is a significant threat, particularly to businesses that have networks that span the globe. I&#8217;ll refer to it as Petya for the purpose of this post.</p>
<p>There is still a lot of uncertainty around this, with conflicting reports indicating it comes in via e-mail or that it worms its own way into people&#8217;s networks. The latter is probably the more correct in this case. However the vast majority of other Ransomware strains that are out there usually spread by e-mail. So, as always follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> and discard any email from strangers and be cautious of email from known sources.</p>
<p>There seems to be growing confidence that this emanated from an accounting application that is widely used in the Ukraine called MeDoc or M.E.Doc. It seems the creator of the application was compromised and the evil doers put the Ransomware into their application and then pushed it to all their customers via an automatic update.</p>
<p><strong>Update as at 19:00 (IST) 28/06/2017: </strong></p>
<p><span style="color: #3366ff;"><em>As we mentioned earlier, it now seems that <a href="https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/">Microsoft</a> have confirmed that the M.E.Doc application, widely used in Ukraine, was the initial source of the outbreak.</em></span></p>
<p><span style="color: #3366ff;"><em>There are now <a href="https://twitter.com/craiu/status/880011103161524224">reports</a> emerging that a Ukrainian Government website is delivering or attempting to deliver Petya Ransomware to any visitors to the site. This is known as a Watering hole attack. If this starts spreading to other sites, this would become much more serious. Follow us on either/both <a href="https://www.facebook.com/L2Cyber/">Facebook</a> and <a href="https://twitter.com/L2Cyber">Twitter</a> to be kept up to date.</em></span></p>
<p><strong>Should I be worried?</strong></p>
<p>If you took action to protect yourself from WannaCry by patching all of your systems with the March updates from Microsoft, you are in pretty good shape. (Apologies for the tech-jargon in the next sentence &#8211; you might want to ask your IT provider about this) If the SMBv1 protocol (a means of accessing file shares across a network) through your firewalls has been closed or simply disabled any SMBv1 services running on your PC or servers, then it currently seems that Petya will not be able to get inside your network.</p>
<p>HOWEVER if you have ONE machine that has NOT been patched with the MARCH updates, then you may be at grave risk. This Petya strain of Ransomware, once it compromises a machine by exploiting the vulnerability patched in March, appears to use other methods to access the remaining machines within your network, even ones that are currently full patched.</p>
<p>So please, follow <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> and keep your machines fully patched as soon as is practical after the patches are released.</p>
<p><strong>How do I know if I&#8217;m being affected?</strong></p>
<p>If Petya gets into your machine, you may not immediately realise it, because the first thing it seems to do is schedule a reboot for 1 hour after it infects you. It is unclear as to whether it starts looking to reach other machines in your network at this time or after the reboot. I would suspect it probably would be trying to infect other machines in your network at this stage.</p>
<p>If your machine suddenly <span style="text-decoration: underline;">reboots without notice</span> and starts up like this <span style="color: #ff0000;"><strong>POWER OFF</strong></span> the machine immediately (pull the plug or press and hold the power button until it shuts down):</p>
<p><img decoding="async" class="aligncenter size-full wp-image-778" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk.png" alt="" width="667" height="369" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk.png 667w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Patya-ChkDsk-300x166.png 300w" sizes="(max-width: 667px) 100vw, 667px" /></p>
<p>This screen is actually Petya scrambling your files. So the earlier you can stop the process by powering off, the more files that you will be able to recover.</p>
<p>I would also recommend that you immediately shut down all other machines that are on your network and seek technical support. By shutting down other machines that may be infected, but have not rebooted, you should not lose any of their data.</p>
<p>At this point you will need the assistance of your IT service provider to help recover the data.</p>
<p><strong>I&#8217;m looking at this screen, what should I do?</strong></p>
<p><img decoding="async" class="aligncenter size-large wp-image-777" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-1024x574.png" alt="Petya / NotPetya / Patna" width="1024" height="574" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-1024x574.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-300x168.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2-768x430.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Petya-ransom-screen2.png 1437w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>First things first &#8211; <span style="text-decoration: underline; color: #ff0000;"><strong>DON&#8217;T PAY</strong></span>! I&#8217;m not just saying that because it&#8217;s not a good idea to fund criminals, but because YOU WON&#8217;T get your files back. This is a purely destructive form of Ransomware.</p>
<p>If you need advice or assistance, please do not hesitate to contact us by e-mail at <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a>.</p>
<p>Keep an eye on our <a href="https://www.facebook.com/L2Cyber/">Facebook</a> and <a href="https://twitter.com/L2Cyber">Twitter</a> for updates, as and when significant changes happen.</p>
<p>The post <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">The latest Ransomware outbreak &#8211; Petya</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
