Financial Self Defense
What You Need To Know About The Petya Attack
The damage the virus caused was widespread and severe. Maersk, the huge Danish shipping company, has reported systems down across multiple sites. The virus reached servers for Rosneft, the Russian oil company. Closer to home, the New Jersey-based pharmaceutical company Merck has reported substantial damage caused by Petya.
Here's
what you need to know about Petya and how to protect yourself from future
ransomware attacks:
1.) What is Petya?
Petya
is a strain of ransomware. Like its predecessors, Petya encrypts the victim's
computer, rendering it unusable unless the victim pays a ransom. Petya demands
that $300 be paid to a static Bitcoin address, and that a Bitcoin wallet and
installation key be emailed to a Posteo email address.
Sound
familiar? It should. This virus comes hot on the heels of last month's WannaCry
attack, which hit more than 150 countries across the globe.
In
fact, the two attacks are eerily similar. A quick analysis of the virus by two
separate firms confirmed that the new ransomware uses the same EternalBlue
exploit harnessed by WannaCry. The exploit targets Windows' SMB file-sharing
system, and was allegedly developed by the NSA and later shared by the Shadow
Brokers hacking group. Microsoft has since patched this weakness, but many
computers remain vulnerable.
Early
reports identified the virus as a variant of the Petya ransomware, although the
company later clarified that the virus is a new strain of ransomware, which it
named "NotPetya." Later, the virus was officially dubbed
"GoldenEye," and has since been interchangeably referred to as
"Petya" and "GoldenEye."
Unfortunately,
you don't need to be personally breached to be infected. You can be a
responsible user, with updated security systems, and still be tricked into
downloading malware through emails or even a shared Word document.
Though
WannaCry affected hundreds of thousands of computers, it is amateurish when
compared to GoldenEye. The newer ransomware not only encrypts crucial files, it
ruins the victim's entire hard drive.
2.) Should I pay the ransom?
If
your computer has been infected by GoldenEye, do not pay the requested ransom.
As always, the demand for payment is merely a ploy to milk you for money. The
attackers do not seem to have any intention - or any capability - of restoring
an encrypted computer to its original state. If you pay the ransom, you won't
see your money, or your files, again. To make it even worse, you will mark
yourself as an easy target for future attacks.
3.) Who is behind Petya?
The
origins of the attack are still unclear, but the involvement of Ukraine's
electric utilities, and the fact that approximately 60% of Petya's damage was
concentrated in Kiev, casts heavy suspicion on Russia.
The
bigger question, though, is why the attack was carried out. Usually, ransomware
has one objective: to make big bucks for the cybercrooks behind the attack. The
creators of Petya, though, do not seem intent on raking in the dough. The virus
has proven to be incapable of decrypting infected machines, discouraging ransom
payouts. Also, Petya has an outrageously complex payment system, based on a
single email address, which was shut down almost immediately after the virus
went public. At last count, the Bitcoin wallet associated with the attack had
netted only $10,000 - a woefully meager payout by ransomware standards.
This
begs the uncomfortable question: What if money wasn't the point? What if the
attackers just had a political agenda? As of now, there are no answers, only
questions.
4.) Is there a fix?
Unfortunately,
at this time, there is no complete fix for the ransomware. There is a way to
block GoldenEye, but it won't shut down every infection. Experts have
determined that it is impossible to find a killswitch for Petya, like there was
for WannaCry.
5.) How can I protect myself from future attacks?
Perhaps
the most disturbing factor in this attack is its resemblance to WannaCry - and
the reality that the two attacks struck just weeks apart.
WannaCry
should have been sufficient motivation for people to strengthen their
computers' protection. Unfortunately, though, it appears that most people read
about the attack and went on with their lives.
In
the wake of the WannaCry panic, Microsoft released special patches to protect
outdated computers from the NSA exploits. And yet, according to Avast, an
antivirus company, 38 million PCs scanned last week still had not patched their
systems.
Don't
be the next victim!
Protect
your computer by updating your security systems to the latest versions.
Remember:
If you use an older OS, you are more vulnerable to attacks; be sure to use the
Microsoft patch to keep your computer safe.
Also,
make sure your antivirus software is updated regularly; many antivirus
companies have also released patches to block Petya and this latest version of
the virus.Finally, use caution. Back up your computer on an external hard drive regularly. Be wary about opening unfamiliar emails and never download anything you can't explain.
With
a bit of precaution and lot of protection, your computer will be safe from all
malware attacks.
Your Turn: Did you take any
action after last month's WannaCry attack? Why, or why not? Share your take
with us in the comments!
Comments
Post a Comment