Updated 3:19PM Pacific Time: A method khổng lồ ‘vaccinate’ yourself against this ransomware variant has been found. I have posted details towards the kết thúc of the post along with a batch file you can run. It is as simple as creating the file C:Windowsperfc và marking it read-only.

Bạn đang xem: Petya and notpetya

Update 2 at 7pm PST on Tuesday: It appears that the initial infection many have come from a company called MeDoc that was breached. Their systems were infected and they then pushed out an update, spreading the infection. MeDoc are disputing the allegation. Sources: Talos quoted on ZDNet, Forbes and FireEye.

This is a public service announcement from due to lớn the widespread & severe nature of this attack. A major ransomware attack targeting Microsoft Windows systems is affecting companies và systems, many of them critical, on a global scale.

What We Know

A new ransomware variant is spreading quickly across the globe at the time of this writing. There is no consensus yet in the security research community, so the following information is provisional in nature:

The ransomware has been dubbed “Petya.” It likely spreads by using two separate exploits. You don’t need lớn click on anything or take any action. This can spread into your system through the network. That is why it is having such a wide impact và why it is important that you update your system to lớn protect yourself.

For the technically minded: This ransomware is exploiting a vulnerability in Microsoft Office when handling RTF documents (CVE-2017-0199). It also exploits a vulnerability in SMBv1 which is the Microsoft file-sharing protocol. This second vulnerability is described in Microsoft security bulletin MS17-010.

The ransomware has affected a large number of companies, organizations & government entities on an international scale. The following is a screenshot of the ransomware page you are confronted with once your files are encrypted:


Colin Hardy has provided a behavioral analysis of Petya, which includes a video clip demonstration of the malware in action:

What khổng lồ Do

If you have not done so already, you should immediately install the MS17-010 patch from Microsoft.

If you currently run an unpatched Windows system, you may not have time lớn patch it before you are infected. Consider shutting down your machine, if feasible, & leaving it off the network until there is consensus in the research community on what this exploits và how lớn protect against it.

If you are technically able to, we recommend you block network access lớn port 445 on your Windows workstations. You may also want to lớn monitor traffic to lớn that port if you are a security professional.

Keep an eye on the Microsoft Security Response Center where they will hopefully release formal guidance soon.

Xem thêm: Thi Thử Bằng Lái Xe A1 Trực Tuyến, Đề Thi Thử Bằng Lái Xe A1 200 Câu

Update your anti-virus definitions and run a scan on your system. You can find out which anti-virus products are detecting the current variant of Petya on this VirusTotal page. I’ve linked khổng lồ one of the files involved in the infection. The page shows which AV vendors are currently detecting this file. The green check marks mean the tệp tin is not detected by that AV vendor (it’s counterintuitive).

Who This Has Affected So Far

A Ukrainian state power company and Kiev’s main airport were among the first to report issues.The Chernobyl nuclear nguồn plant has had to lớn monitor radiation levels manually after they were forced lớn shut down the Windows systems that their sensors had been using.Antonov aircraft has reported being affected.Copenhagen-based shipping company Maersk is experiencing outages in multiple IT systems và across multiple business units.Food giant Modelez, which makes Oreo and Toblerone, has also been hit.Netherlands-based shipping company TNT was also hit.French construction company St. Gobain has been affected.Pharmaceutical company Merck says they have systems affected.Law firm DLA Piper was hit.Heritage Valley Health System, a US hospital operator, has also been hit.Kiev’s metro system has stopped accepting payment cards because they were affected.

The menu is long và growing; the above just a snapshot.

Strong Incentive for Attackers

Many are reporting the belief that the South Korean hosting company that paid attackers a $1M ransom a week ago to recover their data have created a huge incentive for future ransomware attacks.

That has resulted in this new spate of attacks affecting systems globally.

Coverage of This Story

Update 3:19pm PST: A Vaccine has been Found

In the past couple of hours researchers have found a ‘vaccine’ against having your files encrypted by this new variant of Petya. They discovered that if a file exists, the encryption routine will not run.

Amit Serper who found this had their findings confirmed by other security researchers.

To vaccinate a machine against this ransomware, simply create a file called perfc in the C:Windows folder and mark it read only. The following batch tệp tin courtesy of BleepingComputer will vì chưng the job for you:

This post in BleepingComputer also includes instructions on how to lớn create the tệp tin manually if you would prefer to vì that. Once this file is created, the encryption routine for this specific ransomware variant will not run & encrypt your files.

Xem thêm: Bán Gấp Miếng Đất Bình Dương Dưới 100 Triệu, Mua Đất Bình Dương Giá Dưới 100 Triệu Có Dễ

Help Keep the Community Safe

We recommend you let your friends và family know about this fast spreading chiến dịch as a matter or urgency to lớn help them stay safe.