Seal oli põhjuslike seoste ja korrelatsioon probleem, a worldwide ransom ware campaign hit over one hundred nations and netted attackers some thousand dollars after infecting nicely over 100,000 computer systems. The assault was possible because of NSA hacking equipment leaked by hacking organization The Shadow brokers. Within the assault, a ransom ware strain called WannaCry was used to infect computer systems and call for a bitcoin ransom. A security researcher, who bought a site for $10.69 that turned out to be a kill switch, then fixed the attack. praegu, it seems a new international ransom ware campaign is ongoing, because the list of affected nations already consists of Ukraine, the United Kingdom, India, Spain, Denmark, and the Netherlands. The outbreak is presently smaller than WannaCry even though it’s nonetheless a huge assault.
Group-IB posted in Twitter on 27 juuni:
“A new #WannaCry-like huge attack on Russian and Ukrainian #critical #Infrastructue discovered. More nations anticipated #Petya #infosec p.c.twitter.com/hRDPHKAC8R”
The suspected culprit is Petya ransom ware, a strain that encrypts master file Tree tables, prevents victims from rebooting their computer systems, making it more risky and intrusive than different strains because it prevents them from operating collectively, and reboots their systems to achieve this. Petya has been seen within the past but reports stated that is a new, updated model stimulated by WannaCry. In line with Symantec researchers, this version of Petya now takes benefit of the NSA’s EternalBlue exploits that have already been patched by Microsoft.
Security Response posted in Twitter on 27 juuni:
“Symantec analysts have confirmed #Petya #ransomware, like #WannaCry, is using #EternalBlue exploit to spread”
aga, Petya can spread via electronic mail via booby-trapped office documents, in contrast to WannaCry. These files are then downloaded so they can run the ransom ware installer, which then executes a worm that spreads to new computer systems. aga, Hacker house chief executive Officer Matthew Hickey stated that this assault is being introduced via emails containing Excel files.
Matthew Hickey stated:
“This time it’ll breach people who weren’t impacted by WannaCry as it’ll get to the internal networks through electronic mail.”
Thus far, reports suggest the extortionists at the back of Petya have controlled to pocket seven payments worth 0.87 Bitcoin, nearly $2000. It took them some hours to earn the quantity, at the same time as WannaCry extortionists needed about a day. Petya demands three hundred dollars in bitcoin to provide users a chance to decrypt their computer systems. The most affected nation appears to be Ukraine because the assault has almost taken the country offline. Journalist Christian Borys said on Twitter that banks, postal offerings, and airports, amongst others, were hit. Even government computer systems were compromised. The Ukraine’s central bank has already informed users that an unknown virus hit Ukrainian commercial banks and they’re having problems carrying out banking operations.
Ukrenergo, the Ukraine’s nation power distributor, additionally stated that its IT system was hit, but no power supplies had been affected. Kiev’s metro system, in addition to the international Boryspil airport have already stopped accepting card payments due to the assault. Nation-run aircraft maker Antonov informed that it’s additionally been hit, even though it didn’t clarify how terrible the situation became. Venemaal, Rosneft, an oil organization especially owned by the Russian authorities, has confirmed it’s been affected by the attack. Through Twitter, the organization has told customers it switched to a reserve manage system, possibly preventing its offerings from being affected. It additionally announced government have already been contacted.
Rosneft posted in Twitter on 27 juuni:
“The cyber-attack could cause serious consequences, aga, because of the truth that the organization has switched to a reserve control system.”
In Denmark, delivery company Maersk has stated its systems were taken down. The assault even forced the organization to shut down some operations in Rotterdam. In Spain, local media reports the assault hit food conglomerate Mondelez and regulation firm DLA Piper. Ühendkuningriigis, British advertising organization WPP has had its systems disrupted, even as French construction materials organization St Gobain reported being attacked. Within the United States, pharmaceutical Merck announced through Twitter its computer network was compromised.