Petya Ransomware’s Global Surge Mirrors WannaCry Outbreak

June 27, 2017

Warning: A new wave of ransomware is here, reminiscent of WannaCry! The notorious WannaCry ransomware is far from over as another massive attack is wreaking havoc across the globe, disrupting operations in corporations, power supplies, and banks in nations including Russia, Ukraine, Spain, France, the UK, India, and various parts of Europe, demanding $300 in Bitcoin. Reports indicate that a new variant of Petya ransomware, also referred to as Petwrap, is rapidly proliferating, exploiting the same Windows SMBv1 vulnerability that WannaCry used to compromise 300,000 systems in just 72 hours last month. Alarmingly, many victims have reported that even their patched systems have fallen prey to Petya ransomware. “Petya utilizes the NSA EternalBlue exploit and also propagates within internal networks via WMIC and PSExec, which is why even patched systems can be affected,” confirms Mikko Hyppönen, Chief Research Officer at F-Secure. Petya is proving to be a serious threat…

Petya Ransomware Surge Mimics WannaCry’s Global Impact

June 27, 2017

In a concerning echo of past incidents, the Petya ransomware has initiated a widespread assault on businesses globally, reminiscent of the infamous WannaCry outbreak. While WannaCry’s effects are still being assessed, Petya has swiftly gained momentum, disrupting operations in various sectors, including corporations, utilities, and financial institutions across countries such as Russia, Ukraine, Spain, France, the United Kingdom, India, and throughout Europe. The attack demands a ransom of approximately $300 in Bitcoin from its victims.

This newest iteration of Petya, occasionally referred to as Petwrap, exploits the same vulnerability in Windows SMBv1 that WannaCry did, which was responsible for the rapid infection of 300,000 systems within a mere 72 hours last month. Alarmingly, reports indicate that even systems presumed to be patched against previous exploits have fallen victim to this outbreak. Mikko Hypponen, Chief Research Officer at F-Secure, emphasizes that Petya leverages the NSA’s EternalBlue exploit but also propagates through internal networks using tools like WMIC and PSEXEC, underscoring the attack’s capacity to breach secured environments.

The implications for cybersecurity are significant. Targeting a wide array of organizations, Petya not only affects large enterprises but has also impacted smaller businesses with unpatched systems. The rapid propagation method, coupled with the ransom demand, places urgency on organizational responses to such threats. As businesses navigate these complexities, understanding the relevant tactics and techniques is crucial.

According to the MITRE ATT&CK framework, several adversary tactics may facilitate these attacks. Initial access likely derives from exploiting known vulnerabilities within network configurations, capitalizing on outdated systems. Persistence could be maintained through established footholds within affected environments, using legitimate administrative tools to further propagate the attack. Moreover, privilege escalation strategies may have enabled the attackers to bypass security measures, allowing them broad access across compromised networks.

As this situation develops, organizations must prioritize cybersecurity hygiene, ensuring that all systems are updated and secure. The Petya outbreak serves as a stark reminder of the vulnerabilities that persist within many information systems and the necessity for continuous vigilance against evolving ransomware threats. The experience from WannaCry should inform current strategies, emphasizing the need for both preventive measures and contingency plans to mitigate the impact of such cyber threats.

Source link