After WannaCry, it’s Petya ransomeware

After WannaCry, it’s Petya ransomeware

Following the other countries, the Indian companies have also been affected and one of the few companies are JNPT (Jawaharlal Nehru Port) in Maharashtra.

Maersk earlier tweeted that the attack had impacted “multiple sites and business units”, without confirming which ones.

Ukraine’s central bank, the Rosneft Russian oil company, the WPP British advertising company and the DLA Piper U.S. law firm were among victims of the ransomware attack.

“Cyber-criminals are exploiting the fact that companies have very limited visibility behind their firewalls”, the newspaper quoted Shir Hidayatullah, CEO of cyber security company Smokescreen Technologies.

We have all heard of the growing problem of ransomware and how Windows XP systems seem especially susceptible to WannaCry and it’s variants which were originally zero day vulnerabilities stored up by the NSA then leaked by WikiLeaks.

Petya is still very unsafe, the Singapore Computer Emergency Response Team (SingCERT) explained as the malware doesn’t only encrypt targeted files, but it also stops the computer from loading the operating system.

A global cyber attack‚ which was initiated in the Ukraine‚ spread on Wednesday to other countries in Europe‚ less than two months after the last worldwide ransom ware attack.

How is this different from WannaCry?

Unlike WannaCry, Petya basically locks down computer’s hard drive as well as individual files stored in it.

Petya overwrites and encrypts a computer’s master boot record so recovering information from that computer is highly unlikely. And works well, too, by some reports; not only are these attacks able to make headway because many firms are still using outdated technology, but said firms also aren’t engaging in proper patch discipline and installing necessary patches that would have protected against such issues in the first place.

Once infected by the ransomware, the systems are locked and a demand of Dollars 300 in Bitcoins is made to recover the files.

The cryptolocker demands $300 in bitcoins to let users access their data and does not name the encrypting program, which makes finding a solution hard.

If activated, Petya will demand a ransom amounting to $300 in Bitcoin.

How do I protect myself? “This looks like a sophisticated attack aimed at generating chaos, not money”, computer scientist Prof. This has led many experts to believe that the authors of NotPetya were politically motivated.

If you don’t already, back up your files and keep them in a location that is not connected to your computer. However, if you do not do regular updates and sadly, there is nothing one can do.